gettid() syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:46 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000040)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000080)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:46 executing program 5: gettid() syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:46 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000040)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000080)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:46 executing program 5: gettid() syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:46 executing program 5: gettid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) [ 656.735717] audit: type=1326 audit(1536848446.773:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14598 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:20:46 executing program 5: gettid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) [ 657.400619] audit: type=1326 audit(1536848447.433:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14614 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:20:47 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:47 executing program 5: gettid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:47 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:20:47 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:20:47 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000040)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000080)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:47 executing program 4: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:20:47 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) [ 657.816111] audit: type=1326 audit(1536848447.853:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14626 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:20:47 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:48 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:48 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:48 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:48 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:48 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:48 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:48 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) [ 658.607358] audit: type=1326 audit(1536848448.643:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14656 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 658.696168] audit: type=1326 audit(1536848448.733:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14623 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:20:49 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:20:49 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000040)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000080)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:49 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:49 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:49 executing program 4: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:20:49 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) [ 659.750240] audit: type=1326 audit(1536848449.783:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14675 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 659.797986] audit: type=1326 audit(1536848449.823:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14680 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:20:50 executing program 0: utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:20:50 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:50 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:20:50 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) [ 660.698369] audit: type=1326 audit(1536848450.733:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14699 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:20:50 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:20:51 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) [ 662.156645] audit: type=1326 audit(1536848452.193:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14719 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:20:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000000140), 0x3d8, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 14:20:53 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:53 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x14, 0x0, 0x0) 14:20:53 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:20:53 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:20:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x80000) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x1e) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r2, 0x0, 0x4) 14:20:53 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80201, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:20:53 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80201, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:20:54 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:54 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:54 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000006c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(0x0, 0x3, &(0x7f00000000c0)) r1 = socket$nl_crypto(0x10, 0x3, 0x15) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_1\x00'}) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)) fdatasync(0xffffffffffffffff) 14:20:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80201, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:20:54 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:54 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) [ 664.906121] audit: type=1400 audit(1536848454.943:106): avc: denied { create } for pid=14781 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 664.950899] audit: type=1400 audit(1536848454.983:107): avc: denied { ioctl } for pid=14781 comm="syz-executor4" path="socket:[51323]" dev="sockfs" ino=51323 ioctlcmd=0x8914 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 14:20:55 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:20:55 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:55 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:20:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80201, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:20:55 executing program 4: link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)='./file0\x00') ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000340)=0x40) request_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f00000001c0), &(0x7f0000000200)='user\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @mcast1}, 0x1c) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000040)=0x24) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000500)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be00000028770f80a76be53d2373c4d8a703f244a4660f38302fbae5e5e57567470fe3ba02d43c28010d64ac1e5d31a3b7a298a573bb7f") chown(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) 14:20:55 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:55 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:20:55 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in, @in=@loopback}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000a00)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) io_setup(0x0, &(0x7f0000000040)) io_submit(0x0, 0x0, &(0x7f0000000600)) getegid() gettid() geteuid() lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f80)={{{@in6=@ipv4={[], [], @local}, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000001080)=0xe8) 14:20:55 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:20:55 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:55 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:55 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:56 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:56 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 14:20:56 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:20:56 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:20:56 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:20:56 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x402c4580, &(0x7f0000000200)={0x57, 0x0, 0x3f, {0x0, 0x7}, {}, @ramp={0x0, 0xd90, {0x0, 0x80000001}}}) [ 666.973227] audit: type=1326 audit(1536848456.996:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14844 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:20:57 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) [ 667.250643] audit: type=1326 audit(1536848457.276:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14853 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:20:57 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) [ 667.521726] audit: type=1326 audit(1536848457.546:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14858 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:20:57 executing program 5: truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000500)) geteuid() accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000300)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000006c0)) socket$alg(0x26, 0x5, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001a00)={&(0x7f00000019c0)='.\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001a80)={&(0x7f0000001a40)='./file0/file0\x00'}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001ac0)) accept4$unix(0xffffffffffffff9c, &(0x7f0000001b00), &(0x7f0000001b80)=0x6e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001bc0)) mq_open(&(0x7f0000001c00)='+eth1\x00', 0x0, 0x0, &(0x7f0000001c40)) openat$tun(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/net/tun\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000001cc0)=@ethernet={0x0, @local}, &(0x7f0000001d40)=0x80) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) syz_open_dev$evdev(&(0x7f0000001dc0)='/dev/input/event#\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) memfd_create(&(0x7f0000001e00)='systemposix_acl_accesseth1/}-%\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e40)) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open$cgroup(&(0x7f0000001fc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001f80)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000020c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x41, &(0x7f0000002040)='.#\')%wlan1,security!posix_acl_access-.\'trustedkeyringmime_type!+\x00'}, 0x30) accept(0xffffffffffffffff, &(0x7f0000002100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, &(0x7f0000002180)=0x80) creat(&(0x7f00000021c0)='./file0/file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000002200)='proc.}&vboxnet0}&.\x00', 0xffffffffffffffff}, 0x30) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002280)='/dev/ptmx\x00', 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000022c0)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000002300)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002340), 0xc) creat(&(0x7f0000002380)='./file0/file1\x00', 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getpgid(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000025c0)) signalfd(0xffffffffffffffff, &(0x7f0000002600), 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002640)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002680)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000026c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002700)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002740)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000002780)='syz0\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f00000027c0), 0x0) getpid() openat$fuse(0xffffffffffffff9c, &(0x7f0000003b00)='/dev/fuse\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000003b40)='/dev/hwrng\x00', 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000003b80)) getpgrp(0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000003f40)='\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000004140)) getpgrp(0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000056c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000005700)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000005740)) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000005780)='cgroup.subtree_control\x00', 0x2, 0x0) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f00000057c0), 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$urandom(0xffffffffffffff9c, &(0x7f0000005800)='/dev/urandom\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000005840)='ns/mnt\x00') accept$alg(0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$unix(0x1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000058c0)={&(0x7f0000005880)='./file1\x00'}, 0x10) memfd_create(&(0x7f0000005900)='\x00', 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000005940)='ns/pid\x00') bpf$PROG_LOAD(0x5, &(0x7f0000005a80)={0x0, 0x0, &(0x7f0000005980)=@raw, &(0x7f0000005a00)='GPL\x00', 0x0, 0x18, &(0x7f0000005a40)=""/24}, 0x48) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000005b00)='/dev/loop-control\x00', 0x0, 0x0) accept(0xffffffffffffff9c, &(0x7f0000005b40)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000005bc0)=0x80) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000005c00)) signalfd(0xffffffffffffff9c, &(0x7f0000005c40), 0x8) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000005c80)) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005cc0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000005d00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000005d40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005ec0), 0x0, 0x0) getresuid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f0000000c00)) stat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000009c0)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), &(0x7f0000000200)=0x4) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) getpid() fchmod(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 14:20:57 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:20:57 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:57 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:20:58 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:20:58 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:20:58 executing program 5: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) personality(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) fsetxattr(0xffffffffffffffff, &(0x7f0000000140)=@known='security.SMACK64EXEC\x00', &(0x7f0000000640)='trustedppp1vboxnet0]#!\x00', 0x17, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000005c0)) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe(&(0x7f00000000c0)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000600)=0xfffffffffffffe71) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000280)) readahead(0xffffffffffffffff, 0x0, 0x0) restart_syscall() ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) lsetxattr$trusted_overlay_upper(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='trusted.overlay.upper\x00', &(0x7f00000007c0)={0x0, 0xfb, 0x15, 0x0, 0x0, "b8aa35281c2f6bb6034811d6f6c9aa9a"}, 0x15, 0x0) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000003c0)=""/59, 0xffffffffffffff44, 0x0, 0x0, 0x2d2) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={@multicast1, @multicast2}, 0xc) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 14:21:00 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:00 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:00 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:21:00 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:00 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/ipc\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x65, [], 0x0, &(0x7f0000000080), &(0x7f0000000240)=""/101}, &(0x7f00000001c0)=0x78) fstat(0xffffffffffffffff, &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6, @in6=@local}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000100)=""/134, &(0x7f00000002c0)=0x86) 14:21:00 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0x28}, 0x28) 14:21:01 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:01 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:01 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:01 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000006c0), 0xffffffffffffffff) r0 = getpid() r1 = socket$nl_crypto(0x10, 0x3, 0x15) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) fdatasync(r1) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') 14:21:02 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:02 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000006c0), 0xffffffffffffffff) r0 = getpid() r1 = socket$nl_crypto(0x10, 0x3, 0x15) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) fdatasync(r1) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') 14:21:02 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 14:21:02 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:03 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:21:03 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:03 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0), 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000003c0)=""/165) memfd_create(&(0x7f0000000140)='){\x00', 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0x5) getresuid(&(0x7f0000003140), &(0x7f0000000dc0), &(0x7f0000000e00)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) clock_gettime(0x2, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getpid() r0 = semget$private(0x0, 0x3, 0x14a) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000340)=""/103) getgroups(0x0, &(0x7f0000001500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cgroup\x00'}, 0xffffffffffffff92) alarm(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="03517dddf9702e737461742776d86694d1b8bc669bda106e7e5892028985cc5fc367b38e65d8885b0d353e442cf438b0e30965891f30016e516b4bb400203725abae1a7d731ec7f323f70722f4eb67f04337404c55e83d3d490ecf0354f2946787552d9c8dd9468392d0f79cc195fcf72e6a9e", 0x0, 0x0) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 14:21:03 executing program 4: keyctl$set_reqkey_keyring(0x11, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000240)='bdev\x00', 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000001c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'L-', 0x6}, 0x28, 0x0) seccomp(0x0, 0x0, &(0x7f0000000440)={0x0, &(0x7f0000000400)}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000300), 0x0) fdatasync(0xffffffffffffffff) add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'ah\x00'}, &(0x7f0000000380)=0x1e) syz_execute_func(&(0x7f0000000640)="42805da0c60fef69dc0f01eecef3406cd5f4fa780f61127c366766460f382862008fa9309bc4c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56bc44158c6dd000febbd0900000067660f38db6c5e42c4e1fc1199d89b000001f564ac1e5d31a3b744dbe2") 14:21:03 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:03 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 14:21:04 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 14:21:04 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0), 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000003c0)=""/165) memfd_create(&(0x7f0000000140)='){\x00', 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0x5) getresuid(&(0x7f0000003140), &(0x7f0000000dc0), &(0x7f0000000e00)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) clock_gettime(0x2, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getpid() r0 = semget$private(0x0, 0x3, 0x14a) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000340)=""/103) getgroups(0x0, &(0x7f0000001500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cgroup\x00'}, 0xffffffffffffff92) alarm(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="03517dddf9702e737461742776d86694d1b8bc669bda106e7e5892028985cc5fc367b38e65d8885b0d353e442cf438b0e30965891f30016e516b4bb400203725abae1a7d731ec7f323f70722f4eb67f04337404c55e83d3d490ecf0354f2946787552d9c8dd9468392d0f79cc195fcf72e6a9e", 0x0, 0x0) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 14:21:04 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:04 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:04 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:04 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:05 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:21:05 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:05 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:05 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0), 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000003c0)=""/165) memfd_create(&(0x7f0000000140)='){\x00', 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0x5) getresuid(&(0x7f0000003140), &(0x7f0000000dc0), &(0x7f0000000e00)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) clock_gettime(0x2, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getpid() r0 = semget$private(0x0, 0x3, 0x14a) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000340)=""/103) getgroups(0x0, &(0x7f0000001500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cgroup\x00'}, 0xffffffffffffff92) alarm(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="03517dddf9702e737461742776d86694d1b8bc669bda106e7e5892028985cc5fc367b38e65d8885b0d353e442cf438b0e30965891f30016e516b4bb400203725abae1a7d731ec7f323f70722f4eb67f04337404c55e83d3d490ecf0354f2946787552d9c8dd9468392d0f79cc195fcf72e6a9e", 0x0, 0x0) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 14:21:05 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000006c0), 0xffffffffffffffff) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) write(r0, &(0x7f0000000040)="63f50a9be564a8bc72b394a7e5147a6ffaa4999c3e04e9b088a1acf33cc7b5645737bd2a98d34539e204a4e7bca1950cdd8e375f9f6c0bb723ba3f1cf79eb7da1a736f988c3376cb7bf18267a3f765df1b6cd470135900e6d91c41b1ea6727a8c04f10ac939c99701f17a3c68a81f94e9550496331f7eaab60004cb4", 0x7c) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000200), 0x10) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') 14:21:05 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0), 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000003c0)=""/165) memfd_create(&(0x7f0000000140)='){\x00', 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0x5) getresuid(&(0x7f0000003140), &(0x7f0000000dc0), &(0x7f0000000e00)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) clock_gettime(0x2, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getpid() r0 = semget$private(0x0, 0x3, 0x14a) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000340)=""/103) getgroups(0x0, &(0x7f0000001500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cgroup\x00'}, 0xffffffffffffff92) alarm(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="03517dddf9702e737461742776d86694d1b8bc669bda106e7e5892028985cc5fc367b38e65d8885b0d353e442cf438b0e30965891f30016e516b4bb400203725abae1a7d731ec7f323f70722f4eb67f04337404c55e83d3d490ecf0354f2946787552d9c8dd9468392d0f79cc195fcf72e6a9e", 0x0, 0x0) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 14:21:05 executing program 5: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) bind$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a08e6d69ef69dc8600d9d9c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e541754564f37e050f2e1a450ffcbc72c66f00000d64ac1e5d31a3b786e2989f7f") getpid() accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:21:06 executing program 2: keyctl$set_reqkey_keyring(0x4, 0x0) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:06 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:06 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) [ 678.765379] audit: type=1400 audit(1536848468.799:111): avc: denied { write } for pid=15069 comm="syz-executor4" path="socket:[50704]" dev="sockfs" ino=50704 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 678.824636] audit: type=1400 audit(1536848468.799:112): avc: denied { setopt } for pid=15072 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 14:21:18 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:21:18 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:19 executing program 4: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000300)='./file0\x00', 0x4841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) fgetxattr(r1, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000140)=""/112, 0x70) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000001c0)=""/1) 14:21:19 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:19 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:19 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='ns\x00') execveat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000380), &(0x7f00000005c0), 0x0) open$dir(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 14:21:19 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x1e) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 14:21:19 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:19 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x7530}, 0x8) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:21:19 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x800000, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 14:21:30 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:21:30 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r2, &(0x7f0000003080)=[{{&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ee8caa8d101b053647486aecf6af59ef78a21863127dd953008e3d2b110deef7eb3709315ca9071768ea22b4ff33420f6e26f34d61408fce475eb01b4043f3"}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f00000006c0), 0xffffff99}}], 0x1, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000003000)) 14:21:31 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000002c0)={0x6, @local, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 14:21:31 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:31 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:31 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:32 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:32 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:32 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:32 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:32 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:32 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:42 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:21:42 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:42 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:42 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:42 executing program 4: unshare(0x400) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x26085d6cce6967cc}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) 14:21:42 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000012c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f0000000100), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x138) 14:21:43 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:43 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000000040)='./file0\x00', 0x1000001040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) semtimedop(0x0, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)={0x0, 0x1c9c380}) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000180)) 14:21:43 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:43 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:43 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:43 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) [ 713.214830] audit: type=1326 audit(1536848503.237:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15196 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 713.834191] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 715.694826] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 718.744707] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 718.752117] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 14:21:53 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:21:53 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) 14:21:53 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000000040)='./file0\x00', 0x1000001040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) semtimedop(0x0, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)={0x0, 0x1c9c380}) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000180)) 14:21:53 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") [ 723.477922] audit: type=1326 audit(1536848513.507:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15226 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:21:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) listen(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000500)=""/164, 0x19a}, {&(0x7f0000000000)=""/248, 0xf8}], 0x2, 0x0) 14:21:58 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:21:58 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000000040)='./file0\x00', 0x1000001040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) semtimedop(0x0, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)={0x0, 0x1c9c380}) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000180)) 14:21:58 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:58 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) [ 728.084252] audit: type=1326 audit(1536848518.107:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15241 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 728.155574] audit: type=1326 audit(1536848518.147:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15240 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:21:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)={@mcast2}, 0x36) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() 14:21:58 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:21:58 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) [ 728.995570] audit: type=1326 audit(1536848519.028:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15262 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:22:03 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:22:03 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffb) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) pipe(&(0x7f00000001c0)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) 14:22:03 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)={@mcast2}, 0x36) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() [ 733.077337] audit: type=1326 audit(1536848523.113:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15286 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:22:04 executing program 4: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in, @in=@loopback}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000a00)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) io_setup(0x0, &(0x7f0000000040)) io_submit(0x0, 0x0, &(0x7f0000000600)) getegid() gettid() geteuid() lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f80)={{{@in6=@ipv4={[], [], @local}, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000001080)=0xe8) getegid() 14:22:04 executing program 1: syz_emit_ethernet(0x7a, &(0x7f00000001c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'kO*', 0x44, 0x0, 0x0, @ipv4={[], [], @loopback}, @ipv4={[], [], @multicast1}, {[], @gre}}}}}, &(0x7f0000000040)) 14:22:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)={@mcast2}, 0x36) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() 14:22:04 executing program 2: munlock(&(0x7f000090d000/0x1000)=nil, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f00000012c0)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001200)='/dev/full\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001280), 0x4) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/4096, 0x1000) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002400)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000002300)={0x0, &(0x7f00000022c0)}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 14:22:04 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:04 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) prlimit64(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)) 14:22:04 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000200)='./bus\x00', 0x82) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000001c0), 0x4) fcntl$setstatus(r2, 0x4, 0x6100) sendfile(r2, r1, &(0x7f0000000080), 0xfffffffffffffffc) 14:22:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000006c0), 0xffffffffffffffff) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = getpid() ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x3) socket$nl_crypto(0x10, 0x3, 0x15) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) ptrace$getregset(0x4204, r2, 0x3, &(0x7f0000000100)={&(0x7f0000000000)=""/28, 0x1c}) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000380)={0xdb, 0x0, 0x0, 0x7}) 14:22:14 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:22:14 executing program 1: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000006c0), 0xffffffffffffffff) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = getpid() fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'security.', 'systemcgroupeth0.wlan0d\x00'}) r2 = socket$nl_crypto(0x10, 0x3, 0x15) pwrite64(0xffffffffffffffff, &(0x7f00000003c0)="3e79db10b79a9294d7e18e100e08361e8cb703d1d1dfa3f6c2760a820cc53c861f27d3bd0169af4c358b87953af44fb0e14cb1a66cd00a8059331a647bd88c6c02f6682f487b5e72204c5f8a6a4692f643633a3238deda3ca56b8f715e37ddffbd13b44f342a718dbc1cd9234c9ef3bf544f3d8dcb0d8d25f461ca751df8dd9237e965349c02610e7ea0e25bb4aac4263f967026ae606c9c", 0x98, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7}) 14:22:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000140)=0x60) r1 = dup(r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'ifb0\x00'}) 14:22:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)={@mcast2}, 0x36) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() 14:22:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f0000000140)=""/189, 0xbd) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="ff7b85662e72356d8f2d0521a2566d390b66910b7946e6c8615b75e543feb48f61e49eff880830f56c317500dbd41a7857e031e8a9032c24a9eefabf5e8f0d2933f4becc47fd337e30cba69022240422f22ce91cd0220518fecb3b3eab0b272aa2ba2797b674bb41198320914d5d8db12c35e46dc2945ca5bb255635f20750c1d49709fca0b10f8a86bfe647b0514b1c2be664633b1c00601d52d487fcf4b962310ef6d811f3c94b7e6cef6461bf73820adfb4792f6c70c4ae047ec315073b16238f461af785a19deef40ccb1e2fabca0f01f3605c1b7b370b3d87a17d8f766fe0d74543ca61f5a77946496a9aabeb538e9d639e58bbeac34e1182a62eb13aaa") r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) readahead(r0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)=""/22, &(0x7f00000000c0)=0x16) 14:22:16 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r1) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000001ec0)=@add_del={0x2, &(0x7f0000001e80)='nr0\x00'}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000006c0), 0xffffffffffffffff) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)=0x200) r3 = getpid() fstat(0xffffffffffffffff, &(0x7f0000001800)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001dc0)=@filter={'filter\x00', 0xe, 0x3, 0x148, [0x0, 0x20001880, 0x200018b0, 0x20001a10], 0x0, &(0x7f0000000280), &(0x7f0000001880)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x5, 0x0, 0x0, 'irlan0\x00', 'vcan0\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', @link_local, [0xff], @link_local, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x0, 0x4, 0x6}}}}]}]}, 0x1c0) getegid() ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=""/28, 0x1c}) lseek(r0, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000040)={0xde}) 14:22:16 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000340)={'veth1_to_bridge\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockname(r0, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000480)=0x5) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000040)={@multicast2, @broadcast, 0x0}, &(0x7f0000000080)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x11}, 0x0, r3}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000380)) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 14:22:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)={@mcast2}, 0x36) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 746.048571] audit: type=1400 audit(1536848536.084:119): avc: denied { getattr } for pid=15355 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 14:22:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000040)={@mcast2}, 0x36) 14:22:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:21 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:22:21 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:22:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000140)=0x60) r1 = dup(r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'veth1\x00'}) fanotify_init(0x0, 0x0) 14:22:21 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:21 executing program 4: getrandom(&(0x7f0000000340)=""/104, 0x68, 0x3) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getresgid(&(0x7f0000000280), &(0x7f0000000100), &(0x7f0000000180)) getegid() syz_execute_func(&(0x7f00000002c0)="42805da06a0f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 14:22:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:22 executing program 1: removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', "776c616e3025272f1670726f630d7070703023766d6e65743000"}) setrlimit(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 14:22:22 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:22 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:22:23 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:35 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:35 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:22:35 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:22:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) socket$nl_generic(0x10, 0x3, 0x10) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/139, 0x8b) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', r0, 0x0) syz_execute_func(&(0x7f0000000880)="c4217852b4050000000047d03fc4c11571f100c422053b4b19c4e2b147db660f3a0da9e7a6669a00410f1840e40f86c30000001dd703000026660f7691ffffffff") 14:22:35 executing program 4: memfd_create(&(0x7f0000000000)='cgroup\x00', 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) sysfs$1(0x1, &(0x7f00000000c0)='\x00') 14:22:35 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:22:35 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:36 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") 14:22:36 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:37 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getpid() r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000300)={0x0, 0x9, 0x0, 0x40, 0x0, 0x3, 0x5, 0x0, 0x2, 0x247, 0x0, 0x2}) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6, &(0x7f0000000100)=0x80) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x2) clock_gettime(0x0, &(0x7f00000007c0)) 14:22:38 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:38 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:44 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:44 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:44 executing program 4: getrandom(&(0x7f0000000340)=""/104, 0x68, 0x3) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getresgid(&(0x7f0000000280), &(0x7f0000000100), &(0x7f0000000180)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) gettid() perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da06a0f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 14:22:44 executing program 1: getrandom(&(0x7f0000000340)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da06a0f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 14:22:44 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:22:44 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:50 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") 14:22:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:50 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:51 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:51 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") 14:22:51 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:22:51 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:22:52 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:22:58 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:22:58 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:22:58 executing program 1: prctl$setendian(0x14, 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[]) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)) 14:22:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x0, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:58 executing program 5: socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:59 executing program 5: socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:22:59 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:22:59 executing program 5: socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) 14:23:01 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:23:01 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000), 0x4) 14:23:08 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000), 0x4) 14:23:09 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:10 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/ipc\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) 14:23:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000), 0x4) 14:23:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:23:10 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:10 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:10 executing program 5: prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) chdir(&(0x7f0000000380)='./file0/file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getuid() setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000004c0)={0x0, @local, 0x0, 0x0, 'lc\x00'}, 0x2c) socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) 14:23:11 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:23:11 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:11 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:11 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") keyctl$set_reqkey_keyring(0x10, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xfffffffffffffe72) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}}) clock_gettime(0x0, &(0x7f0000000140)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000800)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000440), &(0x7f0000000480)=0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=""/147, 0x93}, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000a40)=ANY=[]) syz_open_dev$dmmidi(&(0x7f0000000980)='/dev/dmmidi#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000009c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000005c0)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x14}, 0x14}}, 0x0) 14:23:12 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:12 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='bpf\x00', 0x1fffffd, &(0x7f00000004c0)={[{@mode={'mode', 0x3d, 0x3}}, {@mode={'mode'}}, {@mode={'mode'}}]}) 14:23:13 executing program 5: prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) chdir(&(0x7f0000000380)='./file0/file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getuid() setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000004c0)={0x0, @local, 0x0, 0x0, 'lc\x00'}, 0x2c) socket$unix(0x1, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:23:19 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:19 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:19 executing program 5: prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) chdir(&(0x7f0000000380)='./file0/file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getuid() setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000004c0)={0x0, @local, 0x0, 0x0, 'lc\x00'}, 0x2c) socket$unix(0x1, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:20 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:21 executing program 1: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:23:21 executing program 5: prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) chdir(&(0x7f0000000380)='./file0/file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getuid() setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000004c0)={0x0, @local, 0x0, 0x0, 'lc\x00'}, 0x2c) socket$unix(0x1, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:21 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:21 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:23:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff800}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'gretap0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @empty, @multicast2}, &(0x7f0000000480)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@dev, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000004680)={@mcast1}, &(0x7f00000046c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000047c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000004880)={@broadcast, @local}, &(0x7f00000048c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004a40)={0x0, @multicast2, @multicast2}, &(0x7f0000004a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004ac0)={0x0, @dev, @broadcast}, &(0x7f0000004b00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000004dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004e00)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000004e40), &(0x7f0000004e80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000006300)={{{@in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000006400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000006580)={{{@in=@loopback, @in=@loopback}}, {{@in6}, 0x0, @in6}}, &(0x7f0000006680)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000070c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000007080)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8800) 14:23:22 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:22 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:23:24 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:24 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:24 executing program 5: gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='-:vmnet1ppp1mime_type)}0\x00', 0xfffffffffffffffe) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) mq_open(&(0x7f00000005c0)='eth0&})\x00', 0x0, 0x0, &(0x7f0000000640)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000280)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000440), 0x4) mq_timedreceive(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) setrlimit(0x0, &(0x7f00000002c0)) msgget(0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f00000002c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") 14:23:24 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:23:25 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:25 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000040)=@routing, 0x8) sendto$inet6(r1, &(0x7f00000001c0)="2a22df30077fb861a961a3a8447ebf3a", 0x10, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f0000000280)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e5d37149eb0f4a333726cf6d5b7647306559155f1c69d6bfd145b83576f2df4d85f271fd4119db923e2412c66dd954eb59dddc7e1fd286a83971b2ba1c63b4f99702cf91f3d1ecffb8ae189c79b403805e83650c251a564942896f205640c23b0cf51fe9bd931f54a343794710a9cd53cef20938edddb2bfa3c1f72f8e79e41e30fb8f9d314abd999ba396521b6c10bec7bc9d0745a80299342f5cf89eb9d94044258fbb18cec1cdbbc016a773d3ae41e3e30248e716fd0873d31454902cbe7dcf7d644dfadc255d99652b5ed5a5b1a75e3ad49cf80178678402e9d3a755d009889b2e6138f81dc02eedcc353aceb2f7781aea08aa91be7e1e2416ba3d555b1f2237f68c5d7dcfcb1b917c292a35d6d7e7cf2cb1dd6dba5a50ce55c4638d7d38cb7afd8da02f281ab69392bc6531eb03eb97c1d075e3342c244861d04bcad8991b8f588e48ad7fe218d2f5e604bb31c59241245b485210fe418af3d6377b59d5ab128497efeced38cc5036b1f34cb89674b5179219f34b9e8e1849695d7c23cce77eb8f038ef9f2cd69d1c9e2d6b46610adbadbdad857a77f59d38cb5120709716b87c52a48de249b231d7e39985b8b58094c0d7b4c6d1671a8ff9d2daaca94df2adcff6420077df0ddbc66d00b141ffc6e28bed09a19056e52a905a72c99a04af56b22da83135808ba2bfe87a39753447e78500d16bdad52d97df73d4852a79e7ec6910701b712cfd58c62b3ade86cf6ff0cd78719fa1ae81640381cb33f4f6b03c913e820cf9eb9b5cf7df9c878596c9ac9444cad118673fe339b4b7287b310ecff4742bfea2612d79d418293f0dfe14bc819c466473438ad71ea3b1386d17a9038b1f5a9285481500f84f4c7eabbf2eb071a101c69cce8e7495bda4c28a4e88f6a258abf58579c290eeb742b2678daab3ecc8c2bf97d89e89472901e254dd63ca7d918f8a7523161e29b28f64b0df1a7bb4a17d0ad734c321623e246bb0b5aaa08e8e7ac42b74ba83c70a8ca80068400be6adc3f4b01ba1050b54e6e4cf72fb567fbd27b74b2bfa7b7cabc6938851c13c6df7d5aaca79afd89b5e925379b959c7929ddfa3399695343f435772d70e5cfa3550377d23f50011ad5657e94c464cd43eb85496fd3b03bcb2d9278ceb432194d9893ffa747dfe85309f256c910e31e81dcd3cd8a13744fc2874737a2ff34bf8c89f15da7cc0853434117d744e30360b38ef1a063f9ee506f048e9980054e6c5c5688d04ece6067ac55bccc9a7773a2c4e21c039d153622130faff9fd675d64ad7284bd011b9b224713a721b4b731cf342357642a1a0bb846f5be443b7e72e9825b5f3a078c6ae09e4512dd93a5be1af13a49e6a33938509d3557aecf2356ac2329871b662a99cf3fd2486b064e7e6f90c1f8d632186a8bda338b02d45da4ea9041d42a23f40b93346dddc473a9f1a3d9f0285b7e48cbb87bc34d44b090a5e2aaf4764a10a44168f1719eff0b0d9bc1ce07750af4c21d0c67eae0799e91328c8b14869e4edd255a41735a2b1818aa9d3b271ba757af010ae6dbad89aa0d8f5b6f8ef3917adcedf247ffcf9ade407dfb50948aa97077a195b5f6eeff443be20f383aa8ebbb4b0f2e888cb7cde9ec09177f4576576f088430e4a61d352607113ce7118f2d8a111469bd5e8236ac0e545cacef326fe313f33963c9a697019602fae8f8899f9862c7", 0x589, 0xc001, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000100)="d6596ece0bc36e30d237e849", 0xc, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 815.444527] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:23:33 executing program 1: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:23:33 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:33 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:33 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:23:33 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:23:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:23:36 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:36 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:36 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:23:37 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:37 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:23:37 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:48 executing program 1: truncate(&(0x7f0000000140)='./file0\x00', 0x0) geteuid() mknod(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000500)) geteuid() accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000300)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000006c0)) socket$alg(0x26, 0x5, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001a00)={&(0x7f00000019c0)='.\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001a80)={&(0x7f0000001a40)='./file0/file0\x00'}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001ac0)) accept4$unix(0xffffffffffffff9c, &(0x7f0000001b00), &(0x7f0000001b80)=0x6e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001bc0)) mq_open(&(0x7f0000001c00)='+eth1\x00', 0x0, 0x0, &(0x7f0000001c40)) openat$tun(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/net/tun\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000001cc0)=@ethernet={0x0, @local}, &(0x7f0000001d40)=0x80) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) syz_open_dev$evdev(&(0x7f0000001dc0)='/dev/input/event#\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) memfd_create(&(0x7f0000001e00)='systemposix_acl_accesseth1/}-%\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e40)) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open$cgroup(&(0x7f0000001fc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001f80)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000020c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x41, &(0x7f0000002040)='.#\')%wlan1,security!posix_acl_access-.\'trustedkeyringmime_type!+\x00'}, 0x30) accept(0xffffffffffffffff, &(0x7f0000002100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, &(0x7f0000002180)=0x80) creat(&(0x7f00000021c0)='./file0/file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000002200)='proc.}&vboxnet0}&.\x00', 0xffffffffffffffff}, 0x30) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002280)='/dev/ptmx\x00', 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000022c0)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000002300)=0x1c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002340), 0xc) creat(&(0x7f0000002380)='./file0/file1\x00', 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getpgid(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000025c0)) signalfd(0xffffffffffffffff, &(0x7f0000002600), 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002640)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002680)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000026c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002700)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002740)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000002780)='syz0\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f00000027c0), 0x0) getpid() openat$fuse(0xffffffffffffff9c, &(0x7f0000003b00)='/dev/fuse\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000003b40)='/dev/hwrng\x00', 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000003b80)) getpgrp(0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000003f40)='\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000004140)) getpgrp(0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000056c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000005700)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000005740)) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000005780)='cgroup.subtree_control\x00', 0x2, 0x0) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f00000057c0), 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$urandom(0xffffffffffffff9c, &(0x7f0000005800)='/dev/urandom\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000005840)='ns/mnt\x00') accept$alg(0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$unix(0x1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000058c0)={&(0x7f0000005880)='./file1\x00'}, 0x10) memfd_create(&(0x7f0000005900)='\x00', 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000005940)='ns/pid\x00') bpf$PROG_LOAD(0x5, &(0x7f0000005a80)={0x0, 0x0, &(0x7f0000005980)=@raw, &(0x7f0000005a00)='GPL\x00', 0x0, 0x18, &(0x7f0000005a40)=""/24}, 0x48) accept(0xffffffffffffff9c, &(0x7f0000005b40)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000005bc0)=0x80) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000005c00)) signalfd(0xffffffffffffff9c, &(0x7f0000005c40), 0x8) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000005c80)) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005cc0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000005d00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000005d40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005ec0), 0x0, 0x0) getresuid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f0000000c00)) stat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000009c0)) getgid() epoll_create(0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000840)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), &(0x7f0000000200)=0x4) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) getpid() fchmod(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 14:23:48 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:23:48 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:48 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:48 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:23:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(0xffffffffffffffff, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:23:49 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:23:49 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 14:23:49 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:23:49 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 14:23:49 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 14:23:49 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:03 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:03 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="00fd03010000004e140000000000000000bb"], 0x1) 14:24:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:24:03 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:03 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:24:03 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:03 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:04 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:04 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:04 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:05 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:05 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:05 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:06 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:14 executing program 1: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) waitid(0x1, 0x0, 0x0, 0xb, &(0x7f0000000640)) get_thread_area(&(0x7f0000000100)={0x0, 0x0, 0x4000, 0x81, 0x100, 0x4, 0x3, 0x4, 0x4, 0x1}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) truncate(&(0x7f00000002c0)='./bus\x00', 0xa00) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000080)) recvmmsg(0xffffffffffffffff, &(0x7f00000057c0)=[{{&(0x7f0000004280)=@sco, 0x80, &(0x7f0000004500)=[{&(0x7f0000004380)=""/14, 0xe}, {&(0x7f00000044c0)=""/38, 0x26}], 0x2, &(0x7f0000004540)=""/46, 0x2e, 0x5}}, {{&(0x7f0000004580)=@llc, 0x80, &(0x7f0000005740)=[{&(0x7f0000004600)=""/4096, 0x1000}, {&(0x7f0000005600)=""/87, 0x57}, {&(0x7f0000005680)=""/161, 0xa1}], 0x3, &(0x7f0000005780)=""/36, 0x24, 0x7}, 0x4}], 0x2, 0x20, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)={0x4bf7d3cb, 0xc1}) 14:24:14 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:14 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:14 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:14 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:24:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:24:15 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:15 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:15 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:16 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:16 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:16 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") [ 869.995512] audit: type=1326 audit(1536848660.032:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15943 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:24:21 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x3f000000) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:21 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:21 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:21 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:24 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:24:24 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:24 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:24 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) [ 874.845350] kworker/dying (23) used greatest stack depth: 13912 bytes left 14:24:25 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:25 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:25 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") [ 880.535577] audit: type=1326 audit(1536848670.566:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15995 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:24:31 executing program 1: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:31 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:31 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:31 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:34 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@loopback}}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000b00)={@mcast2}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'veth1_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000015c0), &(0x7f0000001600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001640)={0x0, @broadcast, @multicast1}, &(0x7f0000001680)=0xc) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@ll, &(0x7f0000001740)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001ac0)={@local}, &(0x7f0000001b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001b40)={@local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'teql0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001c00)=@can, &(0x7f0000001c80)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003540)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @rand_addr}, &(0x7f0000003780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000004140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004400)={0x0, @loopback}, &(0x7f0000004440)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000006680)) recvmmsg(0xffffffffffffff9c, &(0x7f000000c580), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c740)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000dd00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000dd40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000dd80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 14:24:34 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:34 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r0, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:24:34 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:34 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:35 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:35 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:35 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") [ 891.515451] audit: type=1326 audit(1536848681.547:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16041 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 14:24:43 executing program 1: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:43 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:43 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:43 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:24:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="00fd03010000004e140000000000000000bb"], 0x1) 14:24:44 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:44 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:44 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:45 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:45 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:45 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:47 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 14:24:47 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:47 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:24:47 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:47 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:48 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:24:48 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:48 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:49 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:24:49 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:24:49 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:00 executing program 1: prctl$setendian(0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") 14:25:00 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:00 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:25:00 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:00 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgid() getuid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) getgroups(0x0, &(0x7f0000000700)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getgroups(0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002700)={{{@in=@dev, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000002800)=0xe8) getresgid(&(0x7f0000002840), &(0x7f0000002880), &(0x7f00000028c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000040c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000041c0)=0xe8) getegid() lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) fstat(0xffffffffffffffff, &(0x7f00000042c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004340)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000004440)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004480), &(0x7f00000044c0)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580), 0x0, 0x0) pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) 14:25:01 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:01 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:01 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:02 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:02 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:02 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:14 executing program 1: 14:25:14 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:14 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:14 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:25:15 executing program 3: 14:25:15 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:15 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:15 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:15 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:16 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:16 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:21 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f0046bbc04fef7001c020b49ff00000000800008000800030001000000", 0x24) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a300)={'team0\x00'}) 14:25:21 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:21 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:21 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:25:23 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$inet(0x10, 0x2000000000000003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000020ff0)=[{&(0x7f0000000240)="2f0000001c0005c5ffffff000d0000000200001f01000000ec0002c91300010000000000000000005867000043050b", 0x2f}], 0x1}, 0x0) 14:25:23 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:23 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:23 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:24 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:24 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:24 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:30 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgid() getuid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) getgroups(0x0, &(0x7f0000000700)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getgroups(0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002700)={{{@in=@dev, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000002800)=0xe8) getresgid(&(0x7f0000002840), &(0x7f0000002880), &(0x7f00000028c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000040c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000041c0)=0xe8) getegid() lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) fstat(0xffffffffffffffff, &(0x7f00000042c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004340)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000004440)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004480), &(0x7f00000044c0)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580), 0x0, 0x0) pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) 14:25:30 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:30 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:30 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:25:32 executing program 3: prctl$setendian(0x27, 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") 14:25:32 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:32 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:32 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:25:32 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:32 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:42 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgid() getuid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) getgroups(0x0, &(0x7f0000000700)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getgroups(0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002700)={{{@in=@dev, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000002800)=0xe8) getresgid(&(0x7f0000002840), &(0x7f0000002880), &(0x7f00000028c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000040c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000041c0)=0xe8) getegid() lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) fstat(0xffffffffffffffff, &(0x7f00000042c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004340)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000004440)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004480), &(0x7f00000044c0)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580), 0x0, 0x0) pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) 14:25:42 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:42 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:42 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:25:43 executing program 3: prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) chdir(&(0x7f0000000380)='./file0/file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getuid() setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000004c0)={0x0, @local, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:43 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:43 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:43 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:44 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:44 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:44 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:53 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgid() getuid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) getgroups(0x0, &(0x7f0000000700)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getgroups(0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002700)={{{@in=@dev, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000002800)=0xe8) getresgid(&(0x7f0000002840), &(0x7f0000002880), &(0x7f00000028c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000040c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000041c0)=0xe8) getegid() lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) fstat(0xffffffffffffffff, &(0x7f00000042c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004340)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000004440)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004480), &(0x7f00000044c0)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580), 0x0, 0x0) pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) 14:25:53 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:53 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:53 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:25:55 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgid() getuid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) getgroups(0x0, &(0x7f0000000700)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getgroups(0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002700)={{{@in=@dev, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000002800)=0xe8) getresgid(&(0x7f0000002840), &(0x7f0000002880), &(0x7f00000028c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000040c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000041c0)=0xe8) getegid() lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) fstat(0xffffffffffffffff, &(0x7f00000042c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004340)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000004440)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004480), &(0x7f00000044c0)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004580), 0x0, 0x0) pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) 14:25:55 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:55 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:25:55 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:56 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:25:56 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:25:56 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:26:08 executing program 1: socket(0x0, 0xf, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) timerfd_create(0x0, 0x0) prctl$setmm(0x1c, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[], &(0x7f0000000800)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0), &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180), &(0x7f00000001c0)=0x18) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) io_setup(0x0, &(0x7f0000000840)) io_cancel(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000880)}, &(0x7f0000000980)) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000300)=""/229, 0xe5, 0x0, &(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000740)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000580)=""/254) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69af40b440e1b9950810bf2c93fd2a26d9e181780aca84f48d19ac75543d591a12c8ea6136d0e14648eedd747c1d27bef0e09f9f54274d9ec66167e0b07656032855958e42d9ba1afadf2edbbafdba24fa53c5591673615b00e2293e6881ff5569e3570dd8136f03433740994d692c54a7524aa79d192afef2467c1f0d02784373ec13ddb490de8d77e553e832098ac9531d451b6447d45838769484bdf") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000780)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000680)={'rose0\x00', {0x2, 0x0, @multicast1}}) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 14:26:08 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:26:08 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:26:08 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:26:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendto(r1, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:26:09 executing program 3: getrandom(&(0x7f0000000340)=""/104, 0x68, 0x3) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da06a0f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 14:26:09 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:26:09 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:26:09 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:26:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(0xffffffffffffffff, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 14:26:10 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:26:10 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:26:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) inotify_init() connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x301, 0x0) 14:26:21 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:26:21 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:26:21 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:26:21 executing program 4: getrandom(&(0x7f0000000340)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000240)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000440)={@mcast2}, &(0x7f0000000480)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000500)) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='trusted.overlay.origin\x00', &(0x7f0000000840)='y\x00', 0x2, 0x3) r1 = open(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getresgid(&(0x7f0000000280), &(0x7f0000000100), &(0x7f0000000180)) getegid() ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000004c0)={0x18, 0x0, 0x7}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) gettid() getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000580)={0x0, 0x9}, &(0x7f0000000780)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000007c0)={0x0, 0x9}, 0xc) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) close(0xffffffffffffffff) syz_execute_func(&(0x7f00000002c0)="42805da06a0f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 14:26:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)=0x7, 0x12) r1 = socket$kcm(0xa, 0x20000000000003, 0x11) sendmsg(r1, &(0x7f0000001480)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @multicast2}, 0x2, 0x1, 0x4, 0x4}}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000440)="d4ea6400e7155f2902d7e5ca1eda70131441211251f290dc53133765c31933f069e6ca66dfb447982c59fe222a5836facbe29b41224062032bd4f5f8a369e62516122a265a98bc1186d4b54622bea6491224642e8a0caf486af7202a3fed5ca2b9554584a2aef9ae468a2fff4c26afd80afb399b9b3aa3e4639dbf808db8be4134355f11dad440cf9a1e4c684d8dedab59ba66f497cf474168009f52fc3ee044929e2f317a89eeeb82c1459db069736599ad30395c811fb5841c47428c96c3a1c9129395671dc6c50289aa0579460f9145997a7193103e1c15d0dea8040936f39cf5cd7c4371e9ecb196cffc8d4d2284a0d67a6e28e6b48e5da5cea6233ba834615b8f770e2f709c2c9c55a3606be981c10d41d55c268987728ce208a314ac8da717ba5351755956722c07308cb23797ce8d6cc81178c33bff1ce4772dfe9721ca3333acb179c1c2deb4b47d42259b46d05cd058c3a1c473e9ee8e801b1e61ff311301e861fcece7fdd0fc8e860b132e319ed2af99592794b03fb6ebb052d3bc242d639ada56024842608a223bce9b59152c7eac7699e88f38eb19d44b4fbacb3a2e108bddf745e8ece22dd574d2c502638a7f76597e3d69d452f78ea6a52ecdeb1627fa986db5242ba990b2fb69e5b1790451fdf9c41894004b8521b414b6afee5427c877b707449e72dcd354deee5fe84d5cccea5e076a72c19bc5b87fbf8c256943e99d5ee29d2f13eb0c0e5e321c7da9580a2a95375dbb7782084bb3b40f3e1fda6f780c5b378cdef500aa312beb03a7ee85ef2dfe0cd669095fd525ff5d90635df22890b26b6076fe5dddb2863a4ec0994f104ae23285f252d1bf282e7030345db76d23cac64acfb9ad5a8b327641532552daf2d83ffa3436c0a8bafb7c15fc05b163e1f254edaf62e143e64d9e9ebf6e86db3d592e1c38582d8b21f4b26b3f53d84433ab6f64ed323b93f198ccef9f5d9b978c3fafe00d0d6dc2d1747e58a80f2225522c83f3035244b5567e38c924b1c2353b5119c1ea291e6abaab1ae7d8152cd23994b3b34cb3d2afa1bf0f695448bf98bef86f443dc5d811342281fd187fd756d849892cb85f4c2f2ce4593956a39f6bbd1366ba775578a2d100fc2e103ec027f15a3ae6667dfc4e5b45f9a9b9906d80b72871076a87fa09e125c8e1d12332f7d819afa3a66596adf7aa9f340ad285d8dc1e0f102e1c229886e6e895de38a87e80e60fcfda96b33da8aaef7d720ab9ddf6aa3c522dd75cc10718d98efca777c834484b6c0265c272e052ca0982c5162a261df271d12690e0da0818d2d26c1fff9cff38e2d0b69a532668c40f3c97167908a7955ef26e4d5af5f1cadff187bf9784733d80dc9c9478d6ffa61d2a58a87b4de7ddc3aaee02968912a2652dbf8b18378394794c0c64ed0613c14765848cc5bac9cc9ecc20fe22696dfa3e79e026b6dda7e55272123aabd636860b7d8ed85594411ddb244606f15df9d07060513c0d20e23f0f4b2951e288837900800e388540865a856b873110040b334ed081082487fbc7e3e33edbd8f8400d153d9e0e91fe438b713e6b1e166d84cf0977f470e4ba7a4e22fc3b2b81cba26392ede8633db6dda18651e2e267f2b7e80f58e282c5392d361b482e828eedf21c807d8296a4c7411fb575613be8713ee22e6674eea7dc927e686f2e0442671456d96b227c6ae2ce852a35a275c3819799f96cf3043a44cff264179fc9d98d6c321d054462b170c36e71b69c454e745214a223dcbb8a6ea1d48c268b31e9e328b162d3b49ac87266a0cdd1799885e1b87f009a3ec9bf702a2dbad007b4f0bb365d9a9c1478b2f68d87f35fdfd50b1f558f2f1a9fb42b821734212d68fc5c6f96c3f5212386775e39a32a3869930b8da36a5116ace07219f339a7383e37d3d0147488978f19c61df74004a9bc4f0ffb793e269514f5e6da876f44d08a9b4afac6bd25ac175f2df82135c57775ddfc81c7d174d1ad105497f1c407034d313eaceb60a1a0c56339eeaa35a1a2423864b3b5d3eea4b0796ebe77e4c51b0c0e33921172ed01ec4dcac5eca2ac8592c78a284fa9351113a1fc50f19d5fc0e9e01d6d71140b0326d1fbe481211f3c7461d0f266fb2ec47d0c97f9bb3070d7790e26a03e5c96683a06e2a86012a6b3b66b0cf1fbfa84cef3b436c8aa4971836ccdbfeea5c7bc98b1b7d266058820281e62a9e185164e225bacfc26330d6490f357ab0ac572b987c31b011260dbde0f30ff856f12fbf1b4ad3cbdfbf3b2ef379d56991f4febd0d6a2719b3be59205c83760a041cb52ee68bd46f66e0349b217e36726468185bbb56e6a8927f863938bd67cf944ca371e76e9248010373080eec8576680fbc85283093250dbf276308f355e3649e03a3123a8eaeb35b58e19df7d1b31a4c1cb118cb241", 0x6b4}], 0x1, &(0x7f00000025c0)=[{0x60, 0x19e, 0x0, "be77c3e1a866e5657ee223b3f73fe5d134c05e909120d89ce8a2a45b8c07553eac512a7ce4a1fc4d5b9e8c6b9bb42b10886ac13d82b21a5d51154438c1daa53c497aaf09c02177573e2444"}], 0x60, 0x44}, 0x1) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@un=@abs, 0x444, &(0x7f0000000240), 0x0, &(0x7f00000000c0)}, 0xc000) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000180)=@un=@abs, 0x80, &(0x7f00000024c0)=[{&(0x7f00000014c0)="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", 0x51f}], 0x1, &(0x7f0000002540), 0x0, 0x8000}, 0x4) 14:26:22 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:26:22 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:26:22 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:26:23 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:26:23 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:26:23 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:27:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={"73797a6b616c6c65723000000500"}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x6, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000940)="6c6f00966f380f64a1e3d75d627d1fa159ad34909d60d298000000202759175d1563ca52dd984f43891be784e2058077d27c448d4b144278cb7548c2ee63bf3c3e591afc1f394f4281891636c571406eb4b673b00000fc0000080000daefec45ecd549b29bfe8d903f00e9e47e673ac1b2616a96bba7e2c0dcf95108eb167f5411d30d37e62266cf8eab640f747082aed2158e2b63f6bfe1343ea62da563ded7abea1ff873329c5646d518fe0e8f20010000792efc2a82a5a17035c87bf7efabe899eb77238a741c80fcb095a2a7d72c595d45388358f546dc882df5b0b55edb1ab6aa14e2b90d685e4a2dd1ba556e04276c1be06fdbc891251cb5bfb690b4c27f5d2fb3e7c92794cf496fdf0495b506841f483edac504209488eb27d43b367fd9992d1b7c478dd4b925aa51a04b100393e1cce76d8027f0a5ed280da80f26b1f3ff300c82255f928b44b9d9e7f2e4c16923dc8741b9c70d92fa1111b51f039ddd1b6adfac67e3a053d38ae16e97eaf5a0270be9a0f12066aa6ecfb569b664bc920bd5381608b35f3aa4210a79c4260a574d4da8c40b9f016ff4ab26b6170250c3214ea18622d704f1c021edffee24c8398c4230d16444e0495088a2f2599a662424f18196f750acca803a21b49423cb5e9f2703e393b982bfcfc4e3f7034f68f272ca8f66bb2f9f2aaf1a20a5a03f254da58698fa342731c70c3ccc40e88aac2edee4c7f59c6ba43021e91424b3056db56ded0c7493d8a3802759b905bb747cbebc7a0af3f570f89f7e1bd00b1c51") socketpair(0x1, 0x804, 0x1, &(0x7f0000000040)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00'}) perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x9, 0x0, 0x59, 0x81, 0x0, 0x0, 0x80000, 0x0, 0x3, 0x3ff, 0x6, 0x4, 0x0, 0x5, 0xda6, 0x3f000000000000, 0xe6f3, 0x100, 0x0, 0x7, 0x0, 0x9, 0x100, 0x7ff, 0x6, 0x0, 0xe24, 0x3, 0x0, 0x84f, 0x7f, 0x4, 0x6, 0x7, 0x0, 0x0, 0x0, 0x2e, 0x1, @perf_bp={&(0x7f0000000340), 0x1}, 0x204, 0x9, 0x6, 0x0, 0x5, 0x7f, 0x4}, 0x0, 0x5, r1, 0x0) socketpair$inet(0x2, 0x7, 0x1, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r1, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x5) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000700)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={r3, 0xffffffffffffff7f, 0x8}, 0xc) 14:27:10 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:27:10 executing program 3: pipe(&(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$xdp(0xffffffffffffffff, &(0x7f0000000140), 0x10) prctl$setendian(0x14, 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") 14:27:10 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000140)=0x4) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:27:10 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:27:10 executing program 4: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000680)=0x98) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:27:11 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:27:11 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:27:11 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 14:27:12 executing program 2: unshare(0x20010900) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f00000009c0)={0x0, &(0x7f00000001c0)}) prctl$seccomp(0x1d, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) accept(0xffffffffffffff9c, &(0x7f0000000480)=@ethernet={0x0, @remote}, &(0x7f0000000280)=0x80) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) geteuid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000006c0)) getpid() openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240), 0x4) timerfd_create(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000840)=0x1e) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) clock_gettime(0x0, &(0x7f0000000040)) iopl(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0876969ef69dc00d9f0008d00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa43c19600008020bde5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308bf4b") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 14:27:12 executing program 5: timerfd_create(0xfffffffffffffffe, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000940), &(0x7f0000000980)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000009c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000500)}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000580)=0x8) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000ac0)=""/164) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000400), 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[], &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000b80)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000a00)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0), &(0x7f0000000740)=0x8) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000008c0)=""/128) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000880)) memfd_create(&(0x7f0000000300)="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", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000780)=ANY=[], &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 14:27:12 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_open_dev$sg(&(0x7f0000000680)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000740)=0x1c) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @rand_addr}}) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000640)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@multicast1}}, 0x44) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@remote, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0)={@local}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001140)=@xdp, &(0x7f00000011c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001340), &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001500)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@local, @dev}, &(0x7f0000001a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'veth0_to_bond\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000440), 0xc, &(0x7f0000001e00)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000880)) ppoll(&(0x7f0000000540), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) prlimit64(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000780)) getrlimit(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") [ 1047.704779] device lo entered promiscuous mode [ 1192.924746] INFO: task syz-executor1:16562 blocked for more than 140 seconds. [ 1192.932072] Not tainted 4.19.0-rc3+ #13 [ 1192.944567] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1192.952566] syz-executor1 D23160 16562 5535 0x00000004 [ 1192.984552] Call Trace: [ 1192.987252] __schedule+0x86c/0x1ed0 [ 1192.990979] ? is_bpf_text_address+0xac/0x170 [ 1193.004601] ? __sched_text_start+0x8/0x8 [ 1193.008769] ? graph_lock+0x170/0x170 [ 1193.012575] ? graph_lock+0x170/0x170 [ 1193.024564] ? __debug_object_init+0x57d/0x1290 [ 1193.029305] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1193.034412] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1193.054566] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1193.059175] ? find_held_lock+0x36/0x1c0 [ 1193.063251] schedule+0xfe/0x460 [ 1193.084688] ? __mutex_lock+0xbf6/0x1710 [ 1193.088781] ? __schedule+0x1ed0/0x1ed0 [ 1193.092774] ? kasan_check_read+0x11/0x20 [ 1193.104566] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1193.108989] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1193.113577] ? __ww_mutex_add_waiter.part.15+0x120/0x120 [ 1193.134578] ? mutex_destroy+0x200/0x200 [ 1193.138676] ? do_raw_spin_lock+0xc1/0x200 [ 1193.142919] schedule_preempt_disabled+0x13/0x20 [ 1193.164571] __mutex_lock+0xbfb/0x1710 [ 1193.168561] ? rtnl_lock+0x17/0x20 [ 1193.172119] ? mutex_trylock+0x2b0/0x2b0 [ 1193.184574] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1193.189202] ? mark_held_locks+0x130/0x130 [ 1193.193442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1193.214561] ? __call_rcu.constprop.69+0x429/0xbc0 [ 1193.219502] ? __call_rcu.constprop.69+0x429/0xbc0 [ 1193.224429] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1193.254577] ? trace_hardirqs_on+0xbd/0x310 [ 1193.258929] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1193.264210] ? call_rcu+0x12/0x20 [ 1193.274592] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1193.280083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1193.294586] ? locks_remove_posix+0x47d/0x840 [ 1193.299110] ? do_lock_file_wait.part.28+0x260/0x260 [ 1193.304224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1193.311156] ? locks_remove_file+0x3c6/0x5c0 [ 1193.316197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1193.321749] ? ima_file_free+0x132/0x650 [ 1193.334589] ? ima_file_check+0x130/0x130 [ 1193.338767] ? fsnotify+0x1330/0x1330 [ 1193.342650] ? __tun_detach+0x15c0/0x15c0 [ 1193.354565] mutex_lock_nested+0x16/0x20 [ 1193.358636] ? mutex_lock_nested+0x16/0x20 [ 1193.362873] rtnl_lock+0x17/0x20 [ 1193.384588] tun_chr_close+0x3d/0x180 [ 1193.388435] __fput+0x385/0xa30 [ 1193.391725] ? get_max_files+0x20/0x20 [ 1193.404567] ? trace_hardirqs_on+0xbd/0x310 [ 1193.408922] ? kasan_check_read+0x11/0x20 [ 1193.413069] ? task_work_run+0x1af/0x2a0 [ 1193.424571] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1193.430043] ? kasan_check_write+0x14/0x20 [ 1193.434290] ? do_raw_spin_lock+0xc1/0x200 [ 1193.454568] ____fput+0x15/0x20 [ 1193.457875] task_work_run+0x1e8/0x2a0 [ 1193.461768] ? task_work_cancel+0x240/0x240 [ 1193.484635] ? copy_fd_bitmaps+0x210/0x210 [ 1193.488918] ? do_syscall_64+0x9a/0x820 [ 1193.492903] exit_to_usermode_loop+0x318/0x380 [ 1193.504591] ? syscall_slow_exit_work+0x520/0x520 [ 1193.509471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1193.524618] do_syscall_64+0x6be/0x820 [ 1193.528591] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1193.533977] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1193.539571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1193.544441] ? trace_hardirqs_on_caller+0x310/0x310 [ 1193.549999] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1193.555500] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1193.560535] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1193.565869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1193.571064] RIP: 0033:0x410e91 [ 1193.574267] Code: 28 41 0f b6 4a 01 80 f9 7a 0f 84 92 00 00 00 80 f9 6f 75 65 49 83 c2 02 41 bd 01 00 00 00 4c 89 54 24 28 45 0f b6 02 41 80 f8 <29> 74 bc 45 84 c0 74 b7 41 80 f8 2c 74 c0 49 8d 4a 01 eb 12 0f 1f [ 1193.595422] RSP: 002b:00007fff5d2521b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1193.603160] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000410e91 [ 1193.634590] RDX: 0000000000000000 RSI: 0000000000731dd8 RDI: 0000000000000006 [ 1193.641898] RBP: 0000000000000000 R08: ffffffffffffffff R09: ffffffffffffffff [ 1193.664592] R10: 00007fff5d2520e0 R11: 0000000000000293 R12: 0000000002423940 [ 1193.671906] R13: 00000000000f2c63 R14: 00000000000001aa R15: badc0ffeebadface [ 1193.694585] [ 1193.694585] Showing all locks held in the system: [ 1193.700930] 3 locks held by kworker/0:1/14: [ 1193.714555] #0: 000000000e3180cf ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0xb43/0x1b90 [ 1193.734554] #1: 00000000d8fe083e ((addr_chk_work).work){+.+.}, at: process_one_work+0xb9a/0x1b90 [ 1193.743622] #2: 0000000067510446 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 1193.764560] 1 lock held by khungtaskd/984: [ 1193.774979] #0: 000000002c30818e (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 1193.783643] 1 lock held by rsyslogd/5365: [ 1193.804553] #0: 000000001a3e6106 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 1193.812581] 2 locks held by getty/5487: [ 1193.817154] #0: 000000001cce9cac (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1193.825846] #1: 0000000009173049 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1193.835144] 2 locks held by getty/5488: [ 1193.839120] #0: 000000006a8fb3be (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1193.847806] #1: 000000005a2d0dda (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1193.857162] 2 locks held by getty/5489: [ 1193.861137] #0: 00000000039e9cd6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1193.884604] #1: 00000000ec258303 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1193.893499] 2 locks held by getty/5490: [ 1193.914561] #0: 00000000048f6b37 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1193.922831] #1: 000000005f493eb6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1193.932138] 2 locks held by getty/5491: [ 1193.936539] #0: 00000000f72eb331 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1193.945242] #1: 00000000e7e1bda7 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1193.954123] 2 locks held by getty/5492: [ 1193.958520] #0: 00000000b6f0c261 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1193.967175] #1: 000000005c2d16a3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1193.976496] 2 locks held by getty/5493: [ 1193.980469] #0: 00000000a1784826 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1193.989135] #1: 000000006e41d02e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1193.998485] 1 lock held by syz-executor1/15402: [ 1194.003153] #0: 0000000067510446 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 1194.011696] 1 lock held by syz-executor1/15408: [ 1194.016799] #0: 0000000067510446 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 1194.024128] 1 lock held by syz-executor1/16562: [ 1194.044548] #0: 0000000067510446 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 1194.051870] 1 lock held by syz-executor1/16571: [ 1194.064564] [ 1194.066199] ============================================= [ 1194.066199] [ 1194.073212] NMI backtrace for cpu 0 [ 1194.076886] CPU: 0 PID: 984 Comm: khungtaskd Not tainted 4.19.0-rc3+ #13 [ 1194.083722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.093066] Call Trace: [ 1194.095711] dump_stack+0x1c4/0x2b4 [ 1194.099348] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1194.104541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.110090] nmi_cpu_backtrace.cold.3+0x63/0xa2 [ 1194.114765] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 1194.119955] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 1194.125238] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1194.130425] watchdog+0xb3e/0x1050 [ 1194.133994] ? reset_hung_task_detector+0xd0/0xd0 [ 1194.138845] ? __kthread_parkme+0xce/0x1a0 [ 1194.143085] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1194.148195] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1194.153300] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1194.157884] ? trace_hardirqs_on+0xbd/0x310 [ 1194.162213] ? kasan_check_read+0x11/0x20 [ 1194.166363] ? __kthread_parkme+0xce/0x1a0 [ 1194.170597] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1194.176050] ? kasan_check_write+0x14/0x20 [ 1194.180285] ? do_raw_spin_lock+0xc1/0x200 [ 1194.184523] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1194.189632] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1194.195168] ? __kthread_parkme+0xfb/0x1a0 [ 1194.199416] kthread+0x35a/0x420 [ 1194.202782] ? reset_hung_task_detector+0xd0/0xd0 [ 1194.207626] ? kthread_bind+0x40/0x40 [ 1194.211430] ret_from_fork+0x3a/0x50 [ 1194.215255] Sending NMI from CPU 0 to CPUs 1: [ 1194.219863] NMI backtrace for cpu 1 [ 1194.219870] CPU: 1 PID: 15033 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #13 [ 1194.219877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.219881] RIP: 0033:0x4023cb [ 1194.219894] Code: 83 ec 18 89 fe 31 c0 bf e7 00 00 00 e8 0e 4f 05 00 c7 44 24 0c 00 00 00 00 66 0f 1f 44 00 00 8b 44 24 0c 83 c0 01 89 44 24 0c f3 0f 1f 00 41 56 41 be e0 16 40 00 41 55 41 bd f2 1f 4c 00 41 [ 1194.219899] RSP: 002b:00007f12a206e690 EFLAGS: 00000286 [ 1194.219909] RAX: 00000000c1e58cd2 RBX: 000000000000000b RCX: 00000000004572d9 [ 1194.219915] RDX: 0000000000000000 RSI: 00007f12a206e6c0 RDI: 000000000000000b [ 1194.219922] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1194.219928] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1194.219934] R13: 00000000004d7350 R14: 00000000004ca40d R15: 0000000000000000 [ 1194.219939] FS: 00007f12a206f700 GS: 0000000000000000 [ 1194.228796] Kernel panic - not syncing: hung_task: blocked tasks [ 1194.315371] CPU: 0 PID: 984 Comm: khungtaskd Not tainted 4.19.0-rc3+ #13 [ 1194.322219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.331571] Call Trace: [ 1194.334162] dump_stack+0x1c4/0x2b4 [ 1194.337798] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1194.342995] panic+0x238/0x4e7 [ 1194.346197] ? add_taint.cold.5+0x16/0x16 [ 1194.350350] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 1194.355800] ? nmi_trigger_cpumask_backtrace+0x1c4/0x1ed [ 1194.361249] ? nmi_trigger_cpumask_backtrace+0x173/0x1ed [ 1194.366700] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 1194.372155] watchdog+0xb4f/0x1050 [ 1194.375716] ? reset_hung_task_detector+0xd0/0xd0 [ 1194.380566] ? __kthread_parkme+0xce/0x1a0 [ 1194.384802] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1194.389902] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1194.395007] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1194.399591] ? trace_hardirqs_on+0xbd/0x310 [ 1194.403924] ? kasan_check_read+0x11/0x20 [ 1194.408072] ? __kthread_parkme+0xce/0x1a0 [ 1194.412307] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1194.417764] ? kasan_check_write+0x14/0x20 [ 1194.422001] ? do_raw_spin_lock+0xc1/0x200 [ 1194.426239] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1194.431340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1194.436880] ? __kthread_parkme+0xfb/0x1a0 [ 1194.441115] kthread+0x35a/0x420 [ 1194.444480] ? reset_hung_task_detector+0xd0/0xd0 [ 1194.449325] ? kthread_bind+0x40/0x40 [ 1194.453131] ret_from_fork+0x3a/0x50 [ 1194.457984] Kernel Offset: disabled [ 1194.461631] Rebooting in 86400 seconds..