xffffffffffffff9c, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:14 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:14 executing program 0: capset(&(0x7f0000000200), &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:14 executing program 0: capset(&(0x7f0000000200), &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:14 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:14 executing program 0: capset(&(0x7f0000000200), &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:14 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:15 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:15 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(0xffffffffffffffff) r0 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r0, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:15 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:15 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:15 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(0xffffffffffffffff) r0 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r0, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:15 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:15 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(0xffffffffffffffff) r0 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r0, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:15 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:16 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:16 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:16 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:16 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:16 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b", 0x21) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:16 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:16 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:16 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b0000", 0x31) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:17 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:17 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:17 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000", 0x39) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:17 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8", 0x3d) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:17 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:17 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:17 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54", 0x3f) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:17 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:17 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:18 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:18 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:18 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:18 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:18 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:18 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:18 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x8040, 0x0) 02:42:18 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:18 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) 02:42:19 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:19 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:19 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) 02:42:19 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:19 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000005c0)='ppp1security\\{%cpuset$\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) 02:42:19 executing program 0: close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'\x00', {0x2, 0x0, @multicast1}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000009c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) stat(&(0x7f0000000080)='./file1\x00', &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) lstat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) fstat(0xffffffffffffffff, &(0x7f00000020c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2ff2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fec1a1a01460f01ee45dfde9f") 02:42:19 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") [ 247.870533] audit: type=1326 audit(1536979339.880:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8164 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:19 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:20 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:20 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:20 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:20 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:20 executing program 0: close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'\x00', {0x2, 0x0, @multicast1}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000009c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) stat(&(0x7f0000000080)='./file1\x00', &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2ff2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fec1a1a01460f01ee45dfde9f") 02:42:20 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:21 executing program 0: seccomp(0x1, 0x5, &(0x7f0000016000)={0x1, &(0x7f00001e0fe8)=[{0x4000000000006}]}) 02:42:21 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:21 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") [ 249.185227] audit: type=1326 audit(1536979341.195:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8199 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 249.258061] audit: type=1326 audit(1536979341.240:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8199 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:21 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) 02:42:21 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) [ 249.650726] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:42:21 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:21 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:22 executing program 0: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) pipe2(&(0x7f0000000040), 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) memfd_create(&(0x7f0000000900)='/selinux/avc/hash_stats\x00', 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000840)=0xe8) getpid() fstat(0xffffffffffffffff, &(0x7f0000002540)) getgid() getpid() getuid() getgroups(0x0, &(0x7f00000025c0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002600)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@remote}}, &(0x7f0000002700)=0xe8) 02:42:22 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:22 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:22 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:22 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:22 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:23 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:23 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:23 executing program 0: close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'rr\x00'}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getgroups(0x0, &(0x7f0000000780)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) geteuid() stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000300)) getpgid(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="c402ed9114ff448cedffaa3223333341a30f7f7f3766460f38642eab44c19086d962788f197a0779fbc463fd7998b400ba000079aaff43d0e50f0da11b000000010d64ac1e5d31a314b706e20598c4c19414a700000000") 02:42:23 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:23 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000480)) 02:42:23 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:23 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:24 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:24 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:24 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:24 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000480)) 02:42:24 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:25 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:25 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:25 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:25 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:25 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) 02:42:25 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:26 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:26 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:26 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:26 executing program 0: close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'\x00', {0x2, 0x0, @multicast1}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000009c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) stat(&(0x7f0000000080)='./file1\x00', &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) lstat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) fstat(0xffffffffffffffff, &(0x7f00000020c0)) getpgrp(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 02:42:26 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:26 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:27 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:27 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:27 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:27 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:27 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:27 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:27 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:28 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:28 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:28 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:28 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:28 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:29 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:29 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:29 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:29 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:29 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:29 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:30 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:30 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:30 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:30 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:30 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:30 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:31 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:31 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:31 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:31 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:31 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:31 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 02:42:31 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:31 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:31 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:32 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:32 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:32 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:32 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:32 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:32 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 02:42:32 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:32 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:32 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:32 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 02:42:33 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:33 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) [ 261.358150] audit: type=1326 audit(1536979353.366:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8489 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:33 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:33 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 02:42:33 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:33 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:34 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:34 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) [ 262.314150] audit: type=1326 audit(1536979354.324:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8510 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:34 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:34 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:34 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:35 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:35 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) msgget$private(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) getgroups(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000001040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000010c0)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) sync() clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001080)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0x2dc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) [ 263.318156] audit: type=1326 audit(1536979355.328:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8527 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:35 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:35 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:35 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:35 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:35 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:35 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:36 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000480)) 02:42:36 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:36 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:36 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:36 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:37 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:37 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:37 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:37 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:37 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:38 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:38 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:38 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:38 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:38 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:39 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:39 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:39 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:39 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:39 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:39 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:39 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:39 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:39 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:40 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:40 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:40 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:40 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:40 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:40 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:40 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:40 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:40 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:41 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:41 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:41 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:41 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:41 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:41 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:41 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:41 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:41 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:42 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:42 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:42 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:42 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:42 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:42 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:42 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:43 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:43 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:43 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:43 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:43 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:43 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:44 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:44 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:44 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488d") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:44 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:44 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488d") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:44 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:44 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488d") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:45 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d76") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:45 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:45 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:45 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d76") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:45 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:45 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d76") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:45 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 273.747955] audit: type=1326 audit(1536979365.756:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8842 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d7660") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d7660") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d7660") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:46 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:46 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:46 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:46 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:46 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:46 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 274.735312] audit: type=1326 audit(1536979366.745:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8876 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:47 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:47 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:47 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:47 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:47 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0x62) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000015540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000155c0)={@empty, @dev}, &(0x7f0000015600)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000161c0)={&(0x7f0000000440), 0xc, &(0x7f0000016180)={&(0x7f0000015640)={0x14}, 0x14}}, 0x0) 02:42:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:47 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:47 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 275.718284] audit: type=1326 audit(1536979367.727:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8921 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:47 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @loopback}}) 02:42:48 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:48 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:48 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:48 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:48 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:48 executing program 4: 02:42:48 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:48 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 02:42:48 executing program 4: [ 276.915856] audit: type=1326 audit(1536979368.925:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8973 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:49 executing program 4: 02:42:49 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:49 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:49 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 277.218408] audit: type=1326 audit(1536979369.228:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8984 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:49 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:49 executing program 4: 02:42:49 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:49 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000700)=""/210) getrandom(&(0x7f0000000640)=""/148, 0x13e, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getpgrp(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000480)=""/254, 0xfe, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300), &(0x7f0000000340)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/100, &(0x7f0000000240)=0x64) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='lo\x00', 0x0) add_key(&(0x7f0000000840)='syzkaller\x00', &(0x7f0000000580), &(0x7f0000000200), 0xffffff4a, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000c40)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='logon\x00', &(0x7f0000000200), 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000580), 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x0, &(0x7f0000000b40)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 277.497666] audit: type=1326 audit(1536979369.507:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8999 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 02:42:49 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:49 executing program 4: 02:42:49 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:49 executing program 3: 02:42:49 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/keycreate\x00') write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000002c0)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() getgroups(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000240)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) syz_execute_func(&(0x7f00000001c0)="3e400f14cdffaa32233333c4c2958e0941a30f7f7f3766460f3844c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000046db843adb000000ff43d0e14644882c0f010d64ac1e5d6564660f3800668405362e3cfe7b7f") 02:42:50 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:50 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:50 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:42:50 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:50 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) 02:42:50 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:50 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) 02:42:50 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:50 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:50 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) 02:42:50 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:50 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) 02:42:51 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:51 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) 02:42:51 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:42:51 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:51 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:51 executing program 4: r0 = socket(0x0, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) 02:42:51 executing program 4: r0 = socket(0x40000000015, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) 02:42:51 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:51 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:51 executing program 4: socket(0x40000000015, 0x5, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) 02:42:51 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:51 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) [ 280.013862] RDS: rds_bind could not find a transport for fe80::, load rds_tcp or rds_rdma? 02:42:52 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:52 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:52 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:42:52 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}}, 0x1c) 02:42:52 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:52 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:52 executing program 4: close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'\x00', {0x2, 0x0, @multicast1}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000009c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) stat(&(0x7f0000000080)='./file1\x00', &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) lstat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) 02:42:52 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:53 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:53 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:42:53 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:53 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:53 executing program 4: close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'rr\x00'}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getgroups(0x0, &(0x7f0000000780)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) geteuid() stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000300)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@local, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) getgid() getpgid(0xffffffffffffffff) 02:42:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488d") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:54 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488d") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:54 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) 02:42:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488d") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:54 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:54 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d76") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:54 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:42:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d76") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:54 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d76") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:55 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) 02:42:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d7660") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:55 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d7660") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:55 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:55 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:42:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d7660") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:55 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:56 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) 02:42:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr}}) 02:42:56 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:56 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:56 executing program 2: sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000240)) set_mempolicy(0x0, &(0x7f0000000200), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) fstat(0xffffffffffffff9c, &(0x7f0000000140)) seccomp(0x1000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000040)) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a02e6969ef69dc00d9f4c90fe1ff6920375137c343def32a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f21eec46219b98100000000262e6426f30f2b0509000000a3") setfsgid(0x0) syz_execute_func(&(0x7f00000004c0)="428055a032ebb6a20838386830d30000ff0f18378f497812c9ddc422d5f2a6f240d251479f66410b850f0000006205c7c7f2217c29484feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff64f241ae212dfca50000262650430ffb348b0f830c000000") 02:42:56 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:42:56 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:56 executing program 2: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) 02:42:57 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:42:57 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:57 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:57 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:42:57 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:58 executing program 2: readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000005c0)=""/4096, 0x1000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @dev}, &(0x7f0000000400)=0x10) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0xfffffffffffffffe, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 02:42:58 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:42:58 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:58 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:58 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) 02:42:58 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:58 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) 02:42:59 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) 02:42:59 executing program 2: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x0, &(0x7f0000000b80)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in6=@ipv4={[], [], @dev}}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000d00)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000005c0)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000c40)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getpgrp(0x0) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000003c0)={0x0, @speck128, 0x0, "d24c282e8e1cb838"}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000a40)=0xe8) getgid() getpgrp(0x0) 02:42:59 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:42:59 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:42:59 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:42:59 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:42:59 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:42:59 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:42:59 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:43:00 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:43:00 executing program 2: getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@nl=@proc, &(0x7f0000000140)=0xfffffffffffffd4d, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000980)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 02:43:00 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:43:00 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:43:00 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:43:00 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:43:01 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:43:01 executing program 2: close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'rr\x00'}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getgroups(0x0, &(0x7f0000000780)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) geteuid() stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000300)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@local, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) getgid() getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) 02:43:01 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:43:01 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:43:01 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:43:01 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:43:01 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:43:02 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:43:02 executing program 2: sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000240)) set_mempolicy(0x0, &(0x7f0000000200), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) fstat(0xffffffffffffff9c, &(0x7f0000000140)) seccomp(0x1000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000040)) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a032ebb6a20838386830d30000ff0f18378f497812c9ddc422d5f2a6f240d251479f66410b850f0000006205c7c7f2217c29484feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff64f241ae212dfca50000262650430ffb348b0f830c000000") 02:43:02 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:43:02 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:43:02 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:43:02 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:43:03 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:43:03 executing program 2: close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'\x00', {0x2, 0x0, @multicast1}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000009c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) getpgid(0x0) getresuid(&(0x7f0000000bc0), &(0x7f0000000280), &(0x7f0000000c40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000540)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) stat(&(0x7f0000000080)='./file1\x00', &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) lstat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) fstat(0xffffffffffffffff, &(0x7f0000000200)) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) 02:43:03 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:43:03 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:43:03 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:43:03 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:43:04 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:43:04 executing program 2: syz_open_procfs(0x0, &(0x7f0000000280)='fdinfo\x00') set_tid_address(&(0x7f0000000040)) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0), 0xc) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, &(0x7f0000000000)) sigaltstack(&(0x7f0000000000/0x4000)=nil, &(0x7f0000000040)) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/178, 0xb2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 02:43:04 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:43:04 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:43:04 executing program 2: sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000240)) set_mempolicy(0x0, &(0x7f0000000200), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) fstat(0xffffffffffffff9c, &(0x7f0000000140)) seccomp(0x1000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000040)) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)}, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000080)="428055a02e6969ef69dc00d9f4c90fe1ff6920375137c343def32a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f21eec46219b98100000000262e6426f30f2b0509000000a3") setfsgid(0x0) 02:43:04 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:43:04 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:43:05 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:43:05 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:43:05 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:43:05 executing program 2: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 02:43:05 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") 02:43:05 executing program 2: prctl$seccomp(0x23, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'erspan0\x00'}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) mmap(&(0x7f00002a3000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000880)) syz_execute_func(&(0x7f0000000300)="428055a0636969ef69dc00d9908a2036378fc830ce9c3a000000218b3f4e7cde0f470f47ae300f38211a40a5647f41dfe0400f01efe5e57d0ff5121a1a01460f01ee400f38052d080000009f") mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000140)=0xe8) getegid() lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000280)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 02:43:05 executing program 4: ioprio_set$uid(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffa) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 02:43:06 executing program 3: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000440)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) epoll_create1(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) 02:43:06 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfbfffffffffffffa) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:43:06 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xfffffffffffffeb4) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) stat(&(0x7f0000006b00)='./file0\x00', &(0x7f0000006b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getgroups(0x0, &(0x7f0000006c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006c80)) getresgid(&(0x7f0000006e00), &(0x7f0000006e40), &(0x7f0000006e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007300)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 02:43:06 executing program 0: accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000700), 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000740), 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000007c0)=')%ppp1,md5sumP\x00'}, 0x30) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @multicast2}, &(0x7f00000008c0)=0x10, 0x0) dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0xdf) creat(&(0x7f0000000380)='./file0\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.SMACK64MMAP\x00', &(0x7f0000000540)='eth1\'*lo,\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b80), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:43:06 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) msgget$private(0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/128) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/135, 0x87) getegid() syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@dev}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005800), 0x0, 0x0, &(0x7f00000059c0)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006140)=@can, &(0x7f00000061c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f000000a1c0), 0x0, 0x0, &(0x7f000000a3c0)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a480)={0x0, @loopback, @rand_addr}, &(0x7f000000a4c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a500)={@mcast1}, &(0x7f000000a540)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a580)={@dev}, &(0x7f000000a5c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a7c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a800)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a840)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a9c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000ab00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ad80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000d8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d900)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d980)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dc80)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f000000dd80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000de00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000de40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f0000000540), 0xc, &(0x7f000000e740)={&(0x7f000000de80)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=""/38, &(0x7f0000000080)=0x26) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000003c0)=""/220) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000280)=0x4) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000f3d233da7410feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa2989f7f") [ 294.659422] ================================================================== [ 294.666872] BUG: KMSAN: uninit-value in __kmalloc_node_track_caller+0x667/0x1160 [ 294.674433] CPU: 0 PID: 2165 Comm: udevd Not tainted 4.19.0-rc3+ #48 [ 294.680929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.690292] Call Trace: [ 294.692905] dump_stack+0x14b/0x190 [ 294.696563] kmsan_report+0x183/0x2b0 [ 294.700619] __msan_warning+0x70/0xc0 [ 294.704448] __kmalloc_node_track_caller+0x667/0x1160 [ 294.709661] ? netlink_sendmsg+0xb49/0x1290 [ 294.714016] ? netlink_sendmsg+0xb49/0x1290 [ 294.718369] __alloc_skb+0x2f5/0x9e0 [ 294.722106] ? netlink_sendmsg+0xb49/0x1290 [ 294.726463] netlink_sendmsg+0xb49/0x1290 [ 294.730656] ___sys_sendmsg+0xe70/0x1290 [ 294.734747] ? netlink_getsockopt+0x11c0/0x11c0 [ 294.739462] ? __fget_light+0x53/0x700 [ 294.743361] ? __fdget+0x4e/0x60 [ 294.746749] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 294.752149] ? __fget_light+0x1f1/0x700 [ 294.756170] __se_sys_sendmsg+0x2a3/0x3d0 [ 294.760367] __x64_sys_sendmsg+0x4a/0x70 [ 294.764444] do_syscall_64+0xb8/0x100 [ 294.768262] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 294.773466] RIP: 0033:0x7f20fe73f320 [ 294.777197] Code: 02 48 83 c8 ff eb 8d 48 8b 05 14 7b 2a 00 f7 da 64 89 10 48 83 c8 ff eb c9 90 83 3d d5 d2 2a 00 00 75 10 b8 2e 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e ba 00 00 48 89 04 24 [ 294.796125] RSP: 002b:00007fff23da4af8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 294.803855] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f20fe73f320 [ 294.811136] RDX: 0000000000000000 RSI: 00007fff23da4b40 RDI: 0000000000000004 [ 294.818416] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007f20fe787c20 [ 294.825697] R10: 736563697665642f R11: 0000000000000246 R12: 0000000001b452d0 [ 294.832975] R13: 00000000000000ad R14: 0000000001b57650 R15: 0000000001b45250 [ 294.840271] [ 294.841903] Uninit was created at: [ 294.845501] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 294.850623] kmsan_kmalloc+0x98/0x100 [ 294.854437] kmsan_slab_alloc+0x10/0x20 [ 294.858422] __kmalloc_node_track_caller+0x9e7/0x1160 [ 294.863713] __alloc_skb+0x2f5/0x9e0 [ 294.867450] __tcp_send_ack+0x10d/0x880 [ 294.871435] tcp_send_ack+0x68/0x90 [ 294.875072] __tcp_ack_snd_check+0x786/0x8e0 [ 294.879496] tcp_rcv_established+0x1b4e/0x2860 [ 294.884094] tcp_v4_do_rcv+0x689/0xd50 [ 294.887994] tcp_v4_rcv+0x6b60/0x70a0 [ 294.891820] ip_local_deliver_finish+0x7ee/0xea0 [ 294.896593] ip_local_deliver+0x438/0x4d0 [ 294.900774] ip_rcv+0x65f/0x6d0 [ 294.904074] netif_receive_skb_internal+0x5bd/0x970 [ 294.909115] napi_gro_receive+0x668/0xb10 [ 294.913284] receive_buf+0x573c/0x7c70 [ 294.917182] virtnet_poll+0xcca/0x1a20 [ 294.921082] net_rx_action+0x723/0x19d0 [ 294.925071] __do_softirq+0x562/0x948 [ 294.928875] ================================================================== [ 294.936237] Disabling lock debugging due to kernel taint [ 294.941690] Kernel panic - not syncing: panic_on_warn set ... [ 294.941690] [ 294.949079] CPU: 0 PID: 2165 Comm: udevd Tainted: G B 4.19.0-rc3+ #48 [ 294.956965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.966328] Call Trace: [ 294.968941] dump_stack+0x14b/0x190 [ 294.972604] panic+0x35d/0x8cb [ 294.975849] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 294.977533] cgroup: fork rejected by pids controller in [ 294.981338] kmsan_report+0x2a8/0x2b0 [ 294.981368] __msan_warning+0x70/0xc0 [ 294.981396] __kmalloc_node_track_caller+0x667/0x1160 [ 294.981432] ? netlink_sendmsg+0xb49/0x1290 [ 294.986967] /syz5 [ 294.990704] ? netlink_sendmsg+0xb49/0x1290 [ 294.999664] __alloc_skb+0x2f5/0x9e0 [ 294.999687] ? netlink_sendmsg+0xb49/0x1290 [ 294.999726] netlink_sendmsg+0xb49/0x1290 [ 295.022598] ___sys_sendmsg+0xe70/0x1290 [ 295.026692] ? netlink_getsockopt+0x11c0/0x11c0 [ 295.031396] ? __fget_light+0x53/0x700 [ 295.035296] ? __fdget+0x4e/0x60 [ 295.038683] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 295.044067] ? __fget_light+0x1f1/0x700 [ 295.048091] __se_sys_sendmsg+0x2a3/0x3d0 [ 295.052282] __x64_sys_sendmsg+0x4a/0x70 [ 295.056358] do_syscall_64+0xb8/0x100 [ 295.060178] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 295.065384] RIP: 0033:0x7f20fe73f320 [ 295.069109] Code: 02 48 83 c8 ff eb 8d 48 8b 05 14 7b 2a 00 f7 da 64 89 10 48 83 c8 ff eb c9 90 83 3d d5 d2 2a 00 00 75 10 b8 2e 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e ba 00 00 48 89 04 24 [ 295.088047] RSP: 002b:00007fff23da4af8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 295.095796] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f20fe73f320 [ 295.103092] RDX: 0000000000000000 RSI: 00007fff23da4b40 RDI: 0000000000000004 [ 295.110379] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007f20fe787c20 [ 295.117661] R10: 736563697665642f R11: 0000000000000246 R12: 0000000001b452d0 [ 295.124940] R13: 00000000000000ad R14: 0000000001b57650 R15: 0000000001b45250 [ 295.132638] Kernel Offset: disabled [ 295.136274] Rebooting in 86400 seconds..