x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:19 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:20 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:20 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:20 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) socket(0x0, 0x0, 0x0) 09:04:20 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:20 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:21 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:21 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:21 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:21 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:21 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:22 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:22 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:22 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:22 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:22 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:23 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:23 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:23 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:23 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:23 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:23 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:24 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:24 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:24 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:24 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:24 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:24 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:25 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:25 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:25 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:25 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:25 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:25 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:26 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:26 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:26 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:26 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:26 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:26 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:26 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:27 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:27 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:27 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:27 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:27 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:28 executing program 1: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:28 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:28 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:28 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:28 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:28 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:28 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:29 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:29 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:29 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:29 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:29 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:29 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:29 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:29 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:29 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:29 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:30 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:30 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:30 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:30 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:30 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:30 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:30 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:30 executing program 4: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 441.347211] audit: type=1326 audit(1537002270.512:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9523 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:30 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:30 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 441.587277] audit: type=1326 audit(1537002270.752:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9536 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:30 executing program 1: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000000480)}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000580)=""/241, &(0x7f0000000500)=0xf1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)}, &(0x7f0000000a40)=0x10) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getgroups(0x0, &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) getgroups(0x0, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, &(0x7f0000000b80)=0x10) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 441.808782] audit: type=1326 audit(1537002270.972:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9541 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:31 executing program 1: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001700), 0x0) getpid() timerfd_create(0x0, 0x0) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") setrlimit(0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 09:04:31 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:31 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:31 executing program 1: keyctl$set_reqkey_keyring(0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a072286969ef69dc009e9e69203737c3397c2a060fc6211a40a564a70f157a9e400f01efe5e54175450d42002e1a1a3ef0f65855010f185b0031a3b786e2989fc4227992749f55") fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) fanotify_init(0x0, 0x0) getuid() getgroups(0x0, &(0x7f0000000040)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000840)={0xa0}, 0xa0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000080)={&(0x7f00000001c0)=""/150, 0x96}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x9, &(0x7f0000000280)={&(0x7f0000000300)=""/42, 0x2a}}, 0x348) write$tun(0xffffffffffffffff, &(0x7f00000003c0)={@void, @void, @ipv6={0x0, 0x6, "69d9aa", 0x44, 0x0, 0x0, @remote, @mcast2, {[], @gre}}}, 0x6c) 09:04:31 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:31 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:31 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:31 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:31 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:32 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:32 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:32 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:32 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:32 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:32 executing program 1: 09:04:32 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:32 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:32 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:32 executing program 1: 09:04:32 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:32 executing program 1: 09:04:32 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:33 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:33 executing program 1: 09:04:33 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:33 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:33 executing program 1: [ 444.052107] audit: type=1326 audit(1537002273.222:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9627 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:33 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:33 executing program 1: 09:04:33 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:33 executing program 1: setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000500)={0x0, 0x1, 0x29e, @random="c5e26b7b74da"}, 0xfffffffffffffd99) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) timerfd_create(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00', 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) getpgid(0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{}, {0x0, 0x2710}}, 0x0) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") fstat(0xffffffffffffffff, &(0x7f0000000200)) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 09:04:34 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:34 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 444.962066] audit: type=1326 audit(1537002274.132:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9646 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:34 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:34 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:34 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:34 executing program 1: syz_emit_ethernet(0x2c, &(0x7f0000000280)={@local, @local, [], {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@broadcast, @current}, {@broadcast, @random="cbe749897d69"}}}}}, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mprotect(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) chroot(&(0x7f0000000380)='./file1\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000240)=""/151) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 09:04:34 executing program 4: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 445.867482] audit: type=1326 audit(1537002275.032:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9669 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:35 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:35 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:35 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:35 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:35 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001a00)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in=@loopback, @in6=@ipv4={[], [], @local}}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001b80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@dev}, &(0x7f0000000080)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001d00)={0x0, @broadcast, @remote}, &(0x7f0000001d40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in=@loopback}}, {{@in6=@local}}}, &(0x7f0000001e80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002900)={'bridge_slave_1\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002940)={{{@in, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002a40)=0xfffffffffffffc7b) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000002b40)={0x0, @dev, @multicast1}, &(0x7f0000000140)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000a6c0), 0x0, 0x0, &(0x7f000000a880)={0x77359400}) getsockname$packet(0xffffffffffffffff, &(0x7f000000a8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a900)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a940)={@multicast2, @rand_addr}, &(0x7f000000a980)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000aa00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000aa40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in=@dev, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000ab80)=0xe8) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f000000b080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000b0c0), &(0x7f000000b100)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b140)={{{@in=@local, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f000000b240)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000b380)={0x0, @local, @rand_addr}, &(0x7f000000b3c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000b440)=0x14, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f000000b480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b4c0)=0x14) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") pipe2(&(0x7f0000000280), 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000003c0)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 09:04:36 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:36 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:36 executing program 4: 09:04:36 executing program 4: 09:04:36 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:36 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:36 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:37 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:37 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:37 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:37 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:37 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:37 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:38 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:38 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:38 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:39 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:39 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:39 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:39 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:39 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:39 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:40 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:40 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:40 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:40 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:40 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:40 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) 09:04:40 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) 09:04:41 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:41 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:41 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) 09:04:41 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:41 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:41 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) 09:04:42 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:42 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:42 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:42 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:42 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) 09:04:42 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:43 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:43 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:43 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:43 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:43 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:44 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:44 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) 09:04:44 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:44 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:44 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:45 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:45 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:45 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:45 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:45 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:45 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:46 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:46 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:46 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:46 executing program 2: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:46 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:47 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:47 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:47 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:47 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:47 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:47 executing program 2: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:47 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:48 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:48 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:48 executing program 2: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:48 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:48 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:49 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:49 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:49 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:49 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:49 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:49 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:50 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:50 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:50 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:50 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:50 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:50 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:50 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:50 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:50 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:50 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:50 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:51 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:51 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:51 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 462.188294] audit: type=1326 audit(1537002291.352:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10019 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:51 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:51 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:51 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) [ 462.429604] audit: type=1326 audit(1537002291.602:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10025 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:51 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:51 executing program 2: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:51 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:51 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 462.673275] audit: type=1326 audit(1537002291.842:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10038 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:52 executing program 2: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:04:52 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:52 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:52 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:52 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:53 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:53 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:04:53 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:53 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:53 executing program 5: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:54 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:54 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:04:54 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:54 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:54 executing program 5: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:54 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:54 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:55 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:04:55 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:55 executing program 5: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:55 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:55 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:55 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:56 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:04:56 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:56 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:56 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:56 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:56 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:56 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:57 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) 09:04:57 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:57 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:57 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:57 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) 09:04:57 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:57 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:57 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:58 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:58 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:58 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:58 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) 09:04:58 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:58 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:58 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:04:58 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") [ 469.673015] audit: type=1326 audit(1537002298.842:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10202 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:59 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 469.913439] audit: type=1326 audit(1537002299.082:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10209 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:59 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:04:59 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 470.142522] audit: type=1326 audit(1537002299.312:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10216 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:04:59 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:04:59 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') preadv(r0, &(0x7f0000000480), 0x20000000000002af, 0x7ffffffff000) 09:04:59 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:04:59 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:00 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:00 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) [ 471.272695] hrtimer: interrupt took 31726 ns 09:05:00 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:00 executing program 5: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000011c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:05:00 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:01 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:01 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:01 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:01 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:01 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000440)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) ftruncate(0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000001600)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f00000015c0), 0xc, &(0x7f0000001680)={&(0x7f0000001640)=ANY=[]}}, 0x0) prctl$void(0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000300), 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 09:05:02 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:02 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:02 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:02 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:02 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='bdev\x00', 0xffffffffffffff9c}, 0x10) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000600)={0x14}, 0x14) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f00000004c0)='rxrpc_s\x00', &(0x7f0000000500), &(0x7f0000000540)=':md5sum!\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) request_key(&(0x7f00000002c0)='id_resolver\x00', &(0x7f0000000300), &(0x7f0000000340)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") creat(&(0x7f0000000280)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffffa) getpgrp(0xffffffffffffffff) prlimit64(0x0, 0x0, &(0x7f0000000580), 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000380)={'veth1_to_team\x00'}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000600)=ANY=[], 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000005c0)) 09:05:03 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:03 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:03 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:03 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:03 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:03 executing program 5: keyctl$set_reqkey_keyring(0x4, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f0000000200)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000280), 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') msgget(0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000600)=ANY=[], 0x0, 0x0, 0x1801) sysfs$3(0x3) time(&(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000640)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) unlink(&(0x7f0000000140)='./file0\x00') setrlimit(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f00000003c0)="42805da06970ef69dcbe26be2601ee41fc0f183737c40f0dc7410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4c291f73236485f1dde73dfdfc20dad8f4a000000e2c97575d87f") 09:05:04 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:04 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:04 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000580)=""/246, 0x416}}], 0x3b1, 0x0, &(0x7f00000044c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x1ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r3 = dup2(r2, r2) r4 = getpid() rt_sigqueueinfo(r4, 0x2b, &(0x7f0000000040)) write$P9_RFSYNC(r3, &(0x7f0000000000)={0x7}, 0x7) close(r0) 09:05:04 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:04 executing program 5: clone(0x200, &(0x7f0000005980), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000005940)) mknod(&(0x7f0000000180)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000680)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/11, 0xb) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x200000841, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) semtimedop(0x0, &(0x7f0000000200)=[{}], 0x250, &(0x7f0000000240)) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f00000001c0), 0x4) 09:05:04 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:04 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:05 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:05 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:05 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:05 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x0) pipe(&(0x7f00000001c0)) clock_getres(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000740)=ANY=[]) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000000)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) getpid() process_vm_writev(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000b80), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) semget(0xffffffffffffffff, 0x0, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000480)) getgroups(0x0, &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) getgroups(0x0, &(0x7f0000000680)) msgget(0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000580)) 09:05:05 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:06 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:06 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:06 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:06 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:06 executing program 5: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 09:05:06 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:07 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:07 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:07 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:07 executing program 5: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001700), 0x0) getpid() timerfd_create(0x0, 0x0) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000940)=0xe8) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000b40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000cc0)) getgroups(0x0, &(0x7f0000000d00)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f80), &(0x7f0000000fc0)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001000)=ANY=[], 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") setrlimit(0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 09:05:07 executing program 5: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455d2ebc2ebc0d64ac1edde3e37f") pipe2(&(0x7f0000000000), 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000000c0)=""/102) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000040)) 09:05:07 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:07 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:07 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:08 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:08 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:08 executing program 5: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001700), 0x0) getpid() timerfd_create(0x0, 0x0) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000940)=0xe8) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000b40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000cc0)) getgroups(0x0, &(0x7f0000000d00)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f80), &(0x7f0000000fc0)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001000)=ANY=[], 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000140)) io_destroy(0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50}, 0x50) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 09:05:08 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:08 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:08 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:09 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:09 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:09 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getgroups(0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) 09:05:09 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:09 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:09 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:09 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:09 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:10 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:10 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:10 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getgroups(0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) 09:05:11 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:11 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:11 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:11 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:11 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getgroups(0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) 09:05:11 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:12 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:12 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:12 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:12 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:12 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getgroups(0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) 09:05:12 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:12 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:12 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:12 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:13 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:13 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:13 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getgroups(0x0, &(0x7f0000001b80)) 09:05:13 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:13 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:13 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:14 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:14 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:14 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getgroups(0x0, &(0x7f0000001b80)) 09:05:14 executing program 3: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:14 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:14 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:15 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:15 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:15 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getgroups(0x0, &(0x7f0000001b80)) 09:05:15 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:15 executing program 3: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:16 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) 09:05:16 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a540)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000a640)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:16 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:16 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:16 executing program 3: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:17 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) 09:05:17 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:17 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:17 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:18 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:18 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:18 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:18 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) 09:05:18 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:18 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:18 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:18 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:18 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:18 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:18 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:18 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:18 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:19 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:19 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) 09:05:19 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() getgroups(0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) [ 490.081167] audit: type=1326 audit(1537002319.242:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10694 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:05:19 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) 09:05:19 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 09:05:19 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) [ 490.431360] audit: type=1326 audit(1537002319.602:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10704 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:05:19 executing program 3: futex(&(0x7f00000000c0), 0xb, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000a00)=""/200, 0xfffffffffffffd13, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'vlan0\x00'}) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140), 0x2c) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) [ 490.655705] audit: type=1326 audit(1537002319.822:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10712 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 09:05:20 executing program 4: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a0ef0a162b8088949738b7f34e3a1617f5a0f0d952db4638ba19415d7f6fdac2f2f7599e86296da734eef575ed4467dd49cdf7c0b8f38d0fa84cf47432dfd44", "e2ead4b61507e6f6a702e3e6fcdb3f155ad11ce425774c64a3969add5aaa854b"}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:20 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 09:05:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2000) umount2(&(0x7f0000000240)='./file1\x00', 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 09:05:20 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() getgroups(0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) [ 490.974090] kasan: CONFIG_KASAN_INLINE enabled [ 490.998091] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 491.042869] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 491.049153] CPU: 1 PID: 10721 Comm: syz-executor3 Not tainted 4.19.0-rc3-next-20180913+ #73 [ 491.057644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.067023] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 491.072046] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 491.090954] RSP: 0018:ffff88012dac78d8 EFLAGS: 00010206 [ 491.096323] RAX: 0000000000000000 RBX: ffff88012dac79f8 RCX: 0000000000000006 [ 491.103594] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 491.110862] RBP: ffff88012dac79c8 R08: ffff8801c2dd2680 R09: fffffbfff12c24e5 [ 491.118136] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff8801c067e0c0 [ 491.125399] R13: 1ffff10025b58f20 R14: 0000000000000000 R15: ffff88012dac7adc [ 491.132674] FS: 00007fbf1604a700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 491.140901] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 491.147289] CR2: 0000001b2fd21000 CR3: 00000001d215b000 CR4: 00000000001406e0 [ 491.154562] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 491.161833] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 491.169108] Call Trace: [ 491.171709] ? user_get_super+0x250/0x250 [ 491.175957] ? down_write+0x8a/0x130 [ 491.179681] ? do_umount_root+0x218/0x320 [ 491.183829] ? down_read+0x120/0x120 [ 491.187547] do_umount_root+0x2b1/0x320 [ 491.191528] ? namespace_unlock+0x210/0x210 [ 491.195856] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 491.201419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.206962] ? ns_capable_common+0x13f/0x170 [ 491.211375] ksys_umount+0x8b6/0x1230 [ 491.215188] ? task_work_run+0x1af/0x2a0 [ 491.219248] ? __detach_mounts+0x430/0x430 [ 491.223489] ? trace_hardirqs_on+0xbd/0x310 [ 491.227814] ? kasan_check_read+0x11/0x20 [ 491.231964] ? task_work_run+0x1af/0x2a0 [ 491.236033] ? trace_hardirqs_off_caller+0x300/0x300 [ 491.241140] ? kasan_check_write+0x14/0x20 [ 491.245381] ? do_raw_spin_lock+0xc1/0x200 [ 491.249625] ? trace_hardirqs_off+0xb8/0x310 [ 491.254046] ? __x64_sys_futex+0x47f/0x6a0 [ 491.258281] ? do_syscall_64+0x9a/0x820 [ 491.262259] ? do_syscall_64+0x9a/0x820 [ 491.266238] ? lockdep_hardirqs_on+0x421/0x5c0 [ 491.270824] ? trace_hardirqs_on+0xbd/0x310 [ 491.275163] ? exit_to_usermode_loop+0x1f4/0x380 [ 491.279922] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.285290] ? trace_hardirqs_off_caller+0x300/0x300 [ 491.290404] __x64_sys_umount+0x54/0x80 [ 491.294387] do_syscall_64+0x1b9/0x820 [ 491.298272] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 491.303639] ? syscall_return_slowpath+0x5e0/0x5e0 [ 491.308579] ? trace_hardirqs_off+0x310/0x310 [ 491.313078] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 491.318113] ? recalc_sigpending_tsk+0x180/0x180 [ 491.322871] ? kasan_check_write+0x14/0x20 [ 491.327115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 491.331967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.337166] RIP: 0033:0x4572d9 [ 491.340363] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.359264] RSP: 002b:00007fbf16049c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 491.366976] RAX: ffffffffffffffda RBX: 00007fbf1604a6d4 RCX: 00000000004572d9 [ 491.374248] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 491.381520] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 491.388791] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 491.396057] R13: 00000000004d7ba8 R14: 00000000004caa53 R15: 0000000000000000 [ 491.403329] Modules linked in: 09:05:20 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000680)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='gretap0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000800)={'syz_tun\x00', @ifru_addrs=@nfc}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={"7465616d5f736c61766d5f300200"}) fstat(0xffffffffffffffff, &(0x7f0000000480)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000006c0)=@l2, &(0x7f0000000640)=0x80) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000740)=@abs, &(0x7f00000007c0)=0x6e) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") [ 491.537674] kobject: 'loop2' (00000000e716b744): kobject_uevent_env [ 491.548077] kobject: 'loop2' (00000000e716b744): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 491.613822] ---[ end trace 91ac1bd493d9cc41 ]--- [ 491.622649] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 491.644538] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff 09:05:20 executing program 1: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@multicast2, @remote}, &(0x7f0000000f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000240), 0xc, &(0x7f0000001540)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=0x14) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@remote, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000040), 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 491.801022] kobject: 'loop1' (00000000a1e4def7): kobject_uevent_env [ 491.807549] kobject: 'loop1' (00000000a1e4def7): fill_kobj_path: path = '/devices/virtual/block/loop1' 09:05:21 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000023c0)) getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000001340), 0x0, &(0x7f0000001440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") creat(&(0x7f00000012c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000014c0)) geteuid() stat(&(0x7f0000001500)='./file1\x00', &(0x7f0000001540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getgid() lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a80)) getgid() getgroups(0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) [ 491.868567] kobject: 'loop5' (000000005ecda9d4): kobject_uevent_env [ 491.898886] kobject: 'loop5' (000000005ecda9d4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 491.941106] RSP: 0018:ffff88012dac78d8 EFLAGS: 00010206 [ 491.956563] RAX: 0000000000000000 RBX: ffff88012dac79f8 RCX: 0000000000000006 [ 491.979520] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 492.003034] RBP: ffff88012dac79c8 R08: ffff8801c2dd2680 R09: fffffbfff12c24e5 [ 492.029422] tmpfs: No value for mount option './file0' [ 492.043293] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff8801c067e0c0 [ 492.062973] R13: 1ffff10025b58f20 R14: 0000000000000000 R15: ffff88012dac7adc [ 492.081773] FS: 00007fbf1604a700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 492.103780] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 492.119758] CR2: 00007fff66c47b6c CR3: 00000001d215b000 CR4: 00000000001406f0 09:05:21 executing program 0: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @loopback}, &(0x7f0000000d40)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@dev, @multicast1}, &(0x7f0000000dc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f0000001200)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001300)=@hci, &(0x7f0000001380)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001540)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'team0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'lo\x00', @ifru_addrs=@hci}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @rand_addr}}, &(0x7f0000003680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0), &(0x7f0000003900)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a680), &(0x7f000000a6c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a700)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a840)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a980), &(0x7f000000a9c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000af00)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000b000)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000b040)=@can, &(0x7f000000b0c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000b140)={@remote}, &(0x7f000000b180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bac0)={&(0x7f0000000b40), 0xc, &(0x7f000000ba80)={&(0x7f000000b1c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0xc) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) [ 492.160551] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 492.175887] kobject: 'loop0' (00000000a7ff829e): kobject_uevent_env [ 492.183796] kobject: 'loop0' (00000000a7ff829e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 492.202308] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 492.233415] Kernel panic - not syncing: Fatal exception [ 492.239853] Kernel Offset: disabled [ 492.243475] Rebooting in 86400 seconds..