fffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:46 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x0, &(0x7f00000014c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) pwrite64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000080)={0x2, 0x10000, [{}, {}]}) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x0, 0x1000, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000]}) 03:36:46 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:46 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x0, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:46 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x0, &(0x7f00000014c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:46 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:46 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:46 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x0, &(0x7f00000014c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:46 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x0, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:46 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x0, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:46 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x0, &(0x7f00000014c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:47 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x0, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:47 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x0, &(0x7f00000014c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:47 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) prctl$setname(0xf, &(0x7f00000007c0)='\x00') setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@remote, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, 0xe8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:47 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:47 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x0, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:47 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x0, &(0x7f00000014c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:47 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:47 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:47 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x0, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:47 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:47 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x0, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) [ 848.009574] audit: type=1326 audit(2000000207.460:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=21997 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:47 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:47 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) futex(&(0x7f0000000380), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00'}) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fstat(0xffffffffffffffff, &(0x7f0000000500)) getgid() syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:47 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x0, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) [ 848.206841] audit: type=1326 audit(2000000207.650:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22011 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:47 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) [ 848.373364] audit: type=1326 audit(2000000207.820:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22021 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:48 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:48 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:48 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:48 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240)={0xbd}, 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) futex(&(0x7f0000000380), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00'}) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fstat(0xffffffffffffffff, &(0x7f0000000500)) getgid() write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000780)={0xa0}, 0xa0) 03:36:48 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:48 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) [ 848.829702] audit: type=1326 audit(2000000208.280:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22030 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 848.853440] audit: type=1326 audit(2000000208.300:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22032 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:48 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:48 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)=0xfffffffffffffffc) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) [ 849.054017] audit: type=1326 audit(2000000208.500:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22046 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:48 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:49 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:49 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:49 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240)={0xbd}, 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) futex(&(0x7f0000000380), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00'}) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fstat(0xffffffffffffffff, &(0x7f0000000500)) getgid() write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000780)={0xa0}, 0xa0) 03:36:49 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:49 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:49 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:50 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:50 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:50 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:50 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240)={0xbd}, 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) futex(&(0x7f0000000380), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00'}) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fstat(0xffffffffffffffff, &(0x7f0000000500)) getgid() write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000780)={0xa0}, 0xa0) 03:36:50 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:50 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0xfffffffffffffffd, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:51 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:51 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240)={0xbd}, 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) futex(&(0x7f0000000380), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00'}) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fstat(0xffffffffffffffff, &(0x7f0000000500)) getgid() write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000780)={0xa0}, 0xa0) 03:36:51 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:51 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:51 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:51 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:51 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:52 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:52 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:52 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:52 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:52 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:52 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:52 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:52 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:52 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) 03:36:52 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:52 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:53 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:53 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:53 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:53 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:53 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:53 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:53 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:53 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:53 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:53 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) 03:36:53 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:53 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:54 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:54 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:54 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:54 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:54 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:54 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:54 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:54 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) 03:36:54 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:54 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) [ 855.107410] audit: type=1326 audit(2000000214.550:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22237 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:54 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:54 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) [ 855.313919] audit: type=1326 audit(2000000214.760:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22251 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:54 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:54 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:54 executing program 3: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) [ 855.524810] audit: type=1326 audit(2000000214.970:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22259 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:55 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) io_setup(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:55 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:55 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:55 executing program 3: clone(0x200, &(0x7f00000006c0), &(0x7f00000005c0), &(0x7f0000000100), &(0x7f0000000580)) mknod(&(0x7f0000000180)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0x15c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x200000841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) r2 = socket$inet_tcp(0x2, 0x1, 0x0) renameat(r1, &(0x7f00000004c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file1\x00') connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) 03:36:55 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:55 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:55 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:55 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:55 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:55 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:55 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:55 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:55 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:55 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:56 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:56 executing program 3: clone(0x200, &(0x7f00000006c0), &(0x7f00000005c0), &(0x7f0000000100), &(0x7f0000000580)) mknod(&(0x7f0000000180)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0x15c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x200000841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000002c0)) 03:36:56 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:56 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:56 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:56 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:56 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:56 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:56 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:56 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:56 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:56 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:56 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:57 executing program 3: clone(0x200, &(0x7f00000006c0), &(0x7f00000005c0), &(0x7f0000000100), &(0x7f0000000580)) mknod(&(0x7f0000000180)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0x15c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x200000841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000002c0)) 03:36:57 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:57 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:57 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:57 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) [ 857.839275] audit: type=1326 audit(2000000217.290:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22378 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:57 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") [ 857.956143] audit: type=1326 audit(2000000217.400:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22385 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:57 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:57 executing program 3: clone(0x200, &(0x7f00000006c0), &(0x7f00000005c0), &(0x7f0000000100), &(0x7f0000000580)) mknod(&(0x7f0000000180)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0x15c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x200000841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000002c0)) 03:36:57 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) [ 858.203504] audit: type=1326 audit(2000000217.650:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22382 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:57 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:57 executing program 3: clone(0x200, &(0x7f00000006c0), &(0x7f00000005c0), &(0x7f0000000100), &(0x7f0000000580)) mknod(&(0x7f0000000180)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0x15c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x200000841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000002c0)) [ 858.529318] audit: type=1326 audit(2000000217.980:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22398 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:58 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:58 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000140)='./file0\x00', 0x4841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r2, &(0x7f0000003080)=[{{&(0x7f00000003c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ee8caa8d101b053647486aecf6af59ef78a21863127dd953008e3d2b110deef7eb3709315ca9071768ea22b4ff33420f6e26f34d61408fce475eb01b4043f3"}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000500), 0xfffffffffffffee2}}], 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 03:36:58 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) [ 858.697223] audit: type=1326 audit(2000000218.140:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22418 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 858.829657] audit: type=1326 audit(2000000218.280:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22411 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:58 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:58 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xffffffffffffffff}, 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) [ 858.908894] audit: type=1326 audit(2000000218.360:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22424 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:36:58 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:58 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:58 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') socket$packet(0x11, 0x0, 0x300) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000a8eff8)) poll(&(0x7f0000000000), 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000ac5000), 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d80)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e80)) getpgrp(0x0) getresuid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getgid() getpid() geteuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getresuid(&(0x7f00000030c0), &(0x7f0000003100), &(0x7f0000003140)) getgroups(0x0, &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syzkaller1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @broadcast}, &(0x7f0000003b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80), &(0x7f0000003bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003c00), &(0x7f0000003c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003e40)={@broadcast, @broadcast}, &(0x7f0000003e80)=0xffffffffffffff3d) gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000540)}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007980)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007a80)=0xe8) 03:36:58 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:36:59 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000000180)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0x15c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x200000841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f00000002c0)) 03:36:59 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:36:59 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:36:59 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:36:59 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), &(0x7f0000000480)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000500)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @rand_addr}, 0x8) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) 03:36:59 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:37:00 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={'rose0\x00', {0x2, 0x0, @multicast1}}) 03:37:00 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:37:00 executing program 3: futex(&(0x7f00000000c0), 0x9, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000004c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffffff) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/uts\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x2c4) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000940)) splice(0xffffffffffffffff, &(0x7f0000000500), 0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000380)={0x77359400}, &(0x7f0000000440), 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004300)={{{@in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000004400)=0xe8) getgroups(0x0, &(0x7f0000004440)) getpgrp(0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) geteuid() getgroups(0x0, &(0x7f0000004680)) [ 860.626315] cgroup: fork rejected by pids controller in /syz3 03:37:00 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:00 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:00 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:00 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:00 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:00 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:00 executing program 2: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) 03:37:00 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:01 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001500)={0x1, &(0x7f00000014c0)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000001540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622400f4a1d0f0000008c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) 03:37:01 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={'rose0\x00', {0x2, 0x0, @multicast1}}) 03:37:01 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:01 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:01 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:01 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000081c0)={@broadcast, @local}, &(0x7f0000008200)=0xc) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:01 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:01 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:01 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:01 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:02 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:02 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:02 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:02 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) accept4$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000340)=0xe8) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) 03:37:02 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:02 executing program 3: socket$inet6(0xa, 0x42c9ce6c8adfdc84, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000100)=0x1c, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @remote}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast1}, 'tunl0\x00'}) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) pipe2(&(0x7f0000000000), 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f00000008c0)}}, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clock_getres(0x0, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000004500)='team_slave_0\x00'}, 0x30) stat(&(0x7f0000004580)='./file0\x00', &(0x7f00000045c0)) getgroups(0x0, &(0x7f0000004640)) getpid() stat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004800), &(0x7f0000004840), &(0x7f0000004880)) connect(0xffffffffffffffff, &(0x7f0000004a40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) getgroups(0x0, &(0x7f00000048c0)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000400)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004a00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000004480), 0x0, &(0x7f0000004900)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:37:02 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:02 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:02 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:02 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) accept4$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000340)=0xe8) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0), 0x0) 03:37:02 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:02 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:03 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:03 executing program 2: socket$inet6(0xa, 0x42c9ce6c8adfdc84, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000100)=0x1c, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @remote}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast1}, 'tunl0\x00'}) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) pipe2(&(0x7f0000000000), 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f00000008c0)}}, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clock_getres(0x0, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000004500)='team_slave_0\x00'}, 0x30) stat(&(0x7f0000004580)='./file0\x00', &(0x7f00000045c0)) getgroups(0x0, &(0x7f0000004640)) getpid() stat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004800), &(0x7f0000004840), &(0x7f0000004880)) connect(0xffffffffffffffff, &(0x7f0000004a40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) getgroups(0x0, &(0x7f00000048c0)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:37:03 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") 03:37:03 executing program 3: clock_gettime(0x7, &(0x7f0000000540)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000400)=0x1c, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000440)={0x0, @aes128, 0x0, "dc031e13b685cd4a"}) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) times(&(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/174, &(0x7f00000004c0)=0xae) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000640)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) setns(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 863.830166] kauditd_printk_skb: 2 callbacks suppressed [ 863.830179] audit: type=1326 audit(2000000223.280:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22650 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:03 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") [ 864.034555] audit: type=1326 audit(2000000223.480:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22659 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:03 executing program 4: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc364122aa322333403d9989999941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaa6a643d0e1460f0da11b000000010d64ac1e5d31a314b706e2057b7f") [ 864.220256] audit: type=1326 audit(2000000223.670:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22663 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:03 executing program 4: futex(&(0x7f00000000c0), 0x9, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000004c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffffff) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/uts\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x2c4) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000940)) splice(0xffffffffffffffff, &(0x7f0000000500), 0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000380)={0x77359400}, &(0x7f0000000440), 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004300)={{{@in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000004400)=0xe8) getgroups(0x0, &(0x7f0000004440)) getpgrp(0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) geteuid() getgroups(0x0, &(0x7f0000004680)) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000280)=""/216, 0xd8, 0x0, 0x0, 0x0) 03:37:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:03 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:03 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x4200, r1, 0x5, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80000, 0x0) 03:37:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) lremovexattr(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400)=@random={'system.', '\x00'}) 03:37:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) fdatasync(0xffffffffffffffff) [ 864.733628] audit: type=1326 audit(2000000224.180:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22684 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 [ 864.777325] audit: type=1326 audit(2000000224.210:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22683 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:04 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000580)) [ 864.924676] audit: type=1326 audit(2000000224.370:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22692 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:04 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKBSZGET(r0, 0x80041270, &(0x7f0000000240)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) socketpair(0x2, 0x2, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) ptrace$getregs(0xc, r1, 0x7, &(0x7f00000000c0)=""/62) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') 03:37:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:04 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x21, &(0x7f0000000340)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000020fefff57a0af0fff8ffffff79a4f0ff00000000b7060000000000012d6405000000000065040400010000000704000000300000b7050000000000006a0a00fe02000000850000001a000000b70000000000000095000000000000009595b8966da9c113927464ceed2c53c40b02aa85425cb50ca736cc418202c67779eee6311bf04d26197314eda148add3679edf051fcb9d81fbb312f662ad11ef33e7aaf459c49335effbb720126ce66d9705b11d191136085b5fd5a1ae4d78eb3c1766aac6c5d28a4102acda3b6a87a18bab4ace3918694de38a454849af257079bd88a543c51184289d5afb317f6fad24436461b3ef56e2788d8d82b9"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) 03:37:04 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:04 executing program 4: sysfs$2(0x2, 0x8, &(0x7f0000000000)=""/191) [ 865.531435] audit: type=1326 audit(2000000224.980:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22684 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) [ 865.577747] audit: type=1326 audit(2000000225.000:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22683 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) [ 865.689320] audit: type=1326 audit(2000000225.140:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22721 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:05 executing program 2: io_setup(0xfff, &(0x7f00000007c0)=0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000440)}]) [ 865.740623] audit: type=1326 audit(2000000225.170:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22692 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:05 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) writev(r0, &(0x7f00000000c0), 0x2d1) 03:37:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:37:05 executing program 2: io_setup(0xfff, &(0x7f00000007c0)=0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x1f}]) 03:37:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/240, 0xf0) 03:37:05 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004340)=[{&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000002f40), 0x0, &(0x7f0000003140)}], 0x1, 0x0) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb}, 0xb) 03:37:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) 03:37:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:37:05 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000004c0), 0xfffffffffffffef5) 03:37:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) 03:37:06 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) kexec_load(0x0, 0x0, &(0x7f0000000400), 0x0) 03:37:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004340)=[{&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000002f40), 0x0, &(0x7f0000003140)}], 0x1, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) write$P9_RWRITE(r2, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x4}, 0xb) 03:37:06 executing program 1: mknod(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/240, 0xf0) 03:37:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) fstat(0xffffffffffffff9c, &(0x7f00000012c0)) getegid() openat$cuse(0xffffffffffffff9c, &(0x7f0000002b00)='/dev/cuse\x00', 0x2, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/urandom\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002e00)='ns/net\x00') inotify_init1(0x0) signalfd4(0xffffffffffffffff, &(0x7f00000034c0), 0x8, 0x0) [ 867.015447] IPVS: ftp: loaded support on port[0] = 21 03:37:06 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:06 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'user.', '%/\x00'}, &(0x7f0000000180)=""/208, 0xd0) 03:37:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) 03:37:07 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)}], 0x1, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:37:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) getitimer(0x0, &(0x7f0000000380)) 03:37:07 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000140)={"69707674000000000400"}, &(0x7f00000002c0)=0x1e) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x982}) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f0000000440)=""/4096) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) 03:37:07 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='com.apple.system.Security\x00', &(0x7f00000001c0)=""/10, 0xa) 03:37:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) r0 = socket$packet(0x11, 0x80002, 0x300) getsockname(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x80) [ 868.923876] kauditd_printk_skb: 15 callbacks suppressed [ 868.923890] audit: type=1326 audit(2000000228.370:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22805 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 [ 868.952840] audit: type=1326 audit(2000000228.400:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22807 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 [ 869.472359] bridge0: port 1(bridge_slave_0) entered blocking state [ 869.479290] bridge0: port 1(bridge_slave_0) entered disabled state [ 869.486363] device bridge_slave_0 entered promiscuous mode [ 869.494260] device bridge_slave_1 left promiscuous mode [ 869.502371] bridge0: port 2(bridge_slave_1) entered disabled state [ 869.562871] device bridge_slave_0 left promiscuous mode [ 869.568524] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.621585] team0 (unregistering): Port device team_slave_1 removed [ 871.632099] team0 (unregistering): Port device team_slave_0 removed [ 871.644969] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 871.683275] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 871.759894] bond0 (unregistering): Released all slaves [ 871.843713] bridge0: port 2(bridge_slave_1) entered blocking state [ 871.850354] bridge0: port 2(bridge_slave_1) entered disabled state [ 871.857519] device bridge_slave_1 entered promiscuous mode [ 871.893287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 871.923202] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 872.005614] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 872.062776] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 872.285297] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 872.292941] team0: Port device team_slave_0 added [ 872.339253] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 872.346816] team0: Port device team_slave_1 added [ 872.394578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 872.444920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 872.496334] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 872.503973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 872.521696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 872.560297] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 872.567562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 872.579853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 873.052208] bridge0: port 2(bridge_slave_1) entered blocking state [ 873.058668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 873.065332] bridge0: port 1(bridge_slave_0) entered blocking state [ 873.071768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 873.079622] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 873.898713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 874.243430] 8021q: adding VLAN 0 to HW filter on device bond0 [ 874.340276] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 874.437642] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 874.443980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 874.452806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 874.551628] 8021q: adding VLAN 0 to HW filter on device team0 [ 875.124942] audit: type=1326 audit(2000000234.570:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23067 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:15 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001940)='./cgroup/syz0\x00', 0x200002, 0x0) 03:37:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 03:37:15 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwritev(r0, &(0x7f0000000000), 0x0, 0x0) 03:37:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000034c0)=[{{&(0x7f0000001700)=@generic={0x19, "c6ff197cdb49cb2f90515e529bee3b67d00766f88bb034e0bc8d1375f3a7682b220896cb53509f457493feeacab477ad111dd6c2a2e7a9c4ac03eb37a8b1ded9a8870289bdb059aeeb9f8ca7549a4d8e58064d8c032ff2430d02149bd78f2165d95d424d716cf9fb66c96ea28cb990052be65a6e1ff1da955e9a56529543"}, 0x80, &(0x7f0000002b40), 0x0, &(0x7f0000002b80)}}], 0x1, 0x0) 03:37:15 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) [ 875.924726] audit: type=1326 audit(2000000235.370:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23067 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 [ 876.012717] audit: type=1326 audit(2000000235.460:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23070 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) [ 876.075061] audit: type=1326 audit(2000000235.480:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23076 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) mbind(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x3, &(0x7f00000000c0)=0x100000001, 0x5, 0x0) 03:37:15 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="0180c2000000aaf8e5b75e0086dd605da0c60008000000000000000000000000000000000001ff0100000000000000000000000000010000000000089078"], &(0x7f0000000000)={0x0, 0x0, [0x0, 0xb5f]}) [ 876.191339] audit: type=1326 audit(2000000235.640:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23088 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:15 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) chroot(&(0x7f0000000100)='./file0\x00') [ 876.318958] audit: type=1326 audit(2000000235.770:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23093 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 [ 876.813979] audit: type=1326 audit(2000000236.260:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23070 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 [ 876.843639] audit: type=1326 audit(2000000236.280:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23076 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:16 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:16 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) setns(0xffffffffffffffff, 0x0) 03:37:16 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) [ 876.980389] audit: type=1326 audit(2000000236.430:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23103 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(r0, &(0x7f0000000300)=""/111, 0x6f, 0x1, &(0x7f0000000380)=@vsock, 0x80) [ 877.025500] audit: type=1326 audit(2000000236.460:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23107 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:16 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 03:37:16 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 03:37:17 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) epoll_wait(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 03:37:17 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) getdents64(0xffffffffffffffff, &(0x7f0000000180)=""/134, 0x86) 03:37:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:17 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) sendfile(r0, r0, 0x0, 0xfffffffffffffffe) 03:37:17 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000980)=""/140, 0x85847af0cc6e773a) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a45320, &(0x7f00000004c0)={{0x4000000080}, 'port0\x00', 0x3f, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x3d8cb47d95373def}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000a40)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 03:37:17 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000280)={0x0, 0x80000}) 03:37:17 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) 03:37:17 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)) 03:37:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'vcan0\x00', &(0x7f0000000200)=@ethtool_perm_addr}) 03:37:17 executing program 4: 03:37:18 executing program 4: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000280)={0x0, 0x0}) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x3ac) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000005440)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/163, 0xa3}], 0x1, &(0x7f0000005640)=""/190, 0xbe}}, {{&(0x7f0000005700)=@ipx, 0x80, &(0x7f00000014c0)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1}}], 0x2, 0x0, &(0x7f0000005d00)={0x0, 0x989680}) 03:37:18 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:18 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) sendfile(r0, r0, 0x0, 0xfffffffffffffffe) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) memfd_create(&(0x7f00000001c0)='vmnet1\x00', 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000280)={0x0, 0x80000}) 03:37:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x7ff}, &(0x7f0000000180)=0x8) pwrite64(r2, &(0x7f00000005c0)="23e66cba40bfce87265f8e077ffe6efa02824895101ecb231f0daf39d35591909e6a48350e1704eb78beeef10c98d413b82531e86341243b7a20f28926b020f95f7da68b368ffbcd1a72cbdf367711bcb7b35ea86f9106198549a26512fb7b4c5495d6f20b28", 0x66, 0x0) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_aout(r1, &(0x7f00000003c0)={{0x0, 0x7, 0x0, 0x0, 0x152, 0x0, 0x79}, "cb47ba143ecdbf35c6e47c791f4ade381c3fdd0dd1c2847e38de1d011e772e36fd1a4fe501b362b0ae7854"}, 0x4b) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000080)={0x2, 0x10000, [{0x0, 0x0, 0x3ff}, {}]}) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000540)=""/114) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8, 0xffffffff]}) [ 878.913148] sctp: [Deprecated]: syz-executor2 (pid 23178) Use of struct sctp_assoc_value in delayed_ack socket option. [ 878.913148] Use struct sctp_sack_info instead 03:37:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:18 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000280)={0x0, 0x80000}) 03:37:18 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = getpid() creat(&(0x7f0000000300)='./file0\x00', 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) lseek(r0, 0x0, 0x7) 03:37:18 executing program 1: 03:37:18 executing program 3: 03:37:18 executing program 1: [ 879.340820] sctp: [Deprecated]: syz-executor2 (pid 23184) Use of struct sctp_assoc_value in delayed_ack socket option. [ 879.340820] Use struct sctp_sack_info instead 03:37:18 executing program 4: 03:37:18 executing program 1: 03:37:18 executing program 4: 03:37:19 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x7ff}, &(0x7f0000000180)=0x8) pwrite64(r2, &(0x7f00000005c0)="23e66cba40bfce87265f8e077ffe6efa02824895101ecb231f0daf39d35591909e6a48350e1704eb78beeef10c98d413b82531e86341243b7a20f28926b020f95f7da68b368ffbcd1a72cbdf367711bcb7b35ea86f9106198549a26512fb7b4c5495d6f20b28", 0x66, 0x0) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_aout(r1, &(0x7f00000003c0)={{0x0, 0x7, 0x0, 0x0, 0x152, 0x0, 0x79}, "cb47ba143ecdbf35c6e47c791f4ade381c3fdd0dd1c2847e38de1d011e772e36fd1a4fe501b362b0ae7854"}, 0x4b) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000080)={0x2, 0x10000, [{0x0, 0x0, 0x3ff}, {}]}) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000540)=""/114) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8, 0xffffffff]}) 03:37:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x7ff}, &(0x7f0000000180)=0x8) pwrite64(r2, &(0x7f00000005c0)="23e66cba40bfce87265f8e077ffe6efa02824895101ecb231f0daf39d35591909e6a48350e1704eb78beeef10c98d413b82531e86341243b7a20f28926b020f95f7da68b368ffbcd1a72cbdf367711bcb7b35ea86f9106198549a26512fb7b4c5495d6f20b28", 0x66, 0x0) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_aout(r1, &(0x7f00000003c0)={{0x0, 0x7, 0x0, 0x0, 0x152, 0x0, 0x79}, "cb47ba143ecdbf35c6e47c791f4ade381c3fdd0dd1c2847e38de1d011e772e36fd1a4fe501b362b0ae7854"}, 0x4b) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000080)={0x2, 0x10000, [{0x0, 0x0, 0x3ff}, {}]}) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000540)=""/114) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8, 0xffffffff]}) [ 879.670311] sctp: [Deprecated]: syz-executor2 (pid 23206) Use of struct sctp_assoc_value in delayed_ack socket option. [ 879.670311] Use struct sctp_sack_info instead [ 879.730690] sctp: [Deprecated]: syz-executor3 (pid 23210) Use of struct sctp_assoc_value in delayed_ack socket option. [ 879.730690] Use struct sctp_sack_info instead 03:37:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:19 executing program 1: 03:37:19 executing program 4: 03:37:19 executing program 4: 03:37:19 executing program 1: 03:37:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x7ff}, &(0x7f0000000180)=0x8) pwrite64(r2, &(0x7f00000005c0)="23e66cba40bfce87265f8e077ffe6efa02824895101ecb231f0daf39d35591909e6a48350e1704eb78beeef10c98d413b82531e86341243b7a20f28926b020f95f7da68b368ffbcd1a72cbdf367711bcb7b35ea86f9106198549a26512fb7b4c5495d6f20b28", 0x66, 0x0) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_aout(r1, &(0x7f00000003c0)={{0x0, 0x7, 0x0, 0x0, 0x152, 0x0, 0x79}, "cb47ba143ecdbf35c6e47c791f4ade381c3fdd0dd1c2847e38de1d011e772e36fd1a4fe501b362b0ae7854"}, 0x4b) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000080)={0x2, 0x10000, [{0x0, 0x0, 0x3ff}, {}]}) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000540)=""/114) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8, 0xffffffff]}) 03:37:19 executing program 3: 03:37:19 executing program 4: 03:37:19 executing program 1: [ 880.387486] sctp: [Deprecated]: syz-executor2 (pid 23230) Use of struct sctp_assoc_value in delayed_ack socket option. [ 880.387486] Use struct sctp_sack_info instead 03:37:19 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:19 executing program 3: 03:37:19 executing program 1: 03:37:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:20 executing program 4: 03:37:20 executing program 1: 03:37:20 executing program 3: 03:37:20 executing program 2: 03:37:20 executing program 4: 03:37:20 executing program 3: 03:37:20 executing program 2: 03:37:20 executing program 1: 03:37:20 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:20 executing program 4: 03:37:20 executing program 3: 03:37:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:21 executing program 2: 03:37:21 executing program 1: 03:37:21 executing program 3: 03:37:21 executing program 4: 03:37:21 executing program 4: 03:37:21 executing program 3: 03:37:21 executing program 2: 03:37:21 executing program 1: 03:37:21 executing program 1: 03:37:21 executing program 2: 03:37:21 executing program 3: 03:37:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:22 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:22 executing program 4: 03:37:22 executing program 2: 03:37:22 executing program 3: 03:37:22 executing program 1: 03:37:22 executing program 4: 03:37:22 executing program 1: 03:37:22 executing program 2: 03:37:22 executing program 3: 03:37:22 executing program 4: 03:37:22 executing program 1: 03:37:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:23 executing program 3: 03:37:23 executing program 2: 03:37:23 executing program 4: 03:37:23 executing program 1: 03:37:23 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:23 executing program 4: 03:37:23 executing program 1: 03:37:23 executing program 2: 03:37:23 executing program 3: 03:37:23 executing program 4: 03:37:23 executing program 3: 03:37:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:24 executing program 1: 03:37:24 executing program 2: 03:37:24 executing program 4: 03:37:24 executing program 3: 03:37:24 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:24 executing program 1: 03:37:24 executing program 4: 03:37:24 executing program 2: 03:37:24 executing program 3: 03:37:24 executing program 1: 03:37:24 executing program 4: 03:37:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:25 executing program 3: 03:37:25 executing program 2: 03:37:25 executing program 1: 03:37:25 executing program 4: 03:37:25 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:25 executing program 2: 03:37:25 executing program 3: 03:37:25 executing program 4: 03:37:25 executing program 1: 03:37:25 executing program 4: 03:37:25 executing program 2: 03:37:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:26 executing program 3: 03:37:26 executing program 1: 03:37:26 executing program 2: 03:37:26 executing program 4: 03:37:26 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:26 executing program 3: 03:37:26 executing program 4: 03:37:26 executing program 2: 03:37:26 executing program 1: 03:37:26 executing program 4: 03:37:26 executing program 3: 03:37:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:27 executing program 1: 03:37:27 executing program 2: 03:37:27 executing program 3: 03:37:27 executing program 4: 03:37:27 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:27 executing program 4: 03:37:27 executing program 1: 03:37:27 executing program 3: 03:37:27 executing program 2: 03:37:27 executing program 4: 03:37:27 executing program 1: 03:37:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:28 executing program 2: 03:37:28 executing program 3: 03:37:28 executing program 4: 03:37:28 executing program 1: 03:37:28 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:28 executing program 3: 03:37:28 executing program 1: 03:37:28 executing program 2: 03:37:28 executing program 4: 03:37:28 executing program 3: 03:37:28 executing program 2: 03:37:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:29 executing program 1: 03:37:29 executing program 4: 03:37:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:29 executing program 2: pipe2(&(0x7f0000000140), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000300)=@known='security.SMACK64MMAP\x00') keyctl$set_reqkey_keyring(0xb, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x7, 0x0, {0x1, ','}}, 0xa) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:29 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:29 executing program 1: ioprio_set$uid(0x2, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001980)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001ac0)=0x14) 03:37:29 executing program 4: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) 03:37:29 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:29 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:30 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:30 executing program 3: ioprio_set$uid(0x2, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) accept(0xffffffffffffffff, &(0x7f00000017c0)=@xdp, &(0x7f0000001840)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001980)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001ac0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'team0\x00'}) 03:37:30 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:30 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000081c0)={@broadcast, @local}, &(0x7f0000008200)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008340)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000008440)=0xe8) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:30 executing program 1: inotify_init() perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 03:37:30 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:31 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:31 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) 03:37:31 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:31 executing program 3: clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') recvfrom$unix(0xffffffffffffffff, &(0x7f0000000880)=""/100, 0x64, 0x0, &(0x7f0000000900)=@abs, 0x6e) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000980), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a00)) fchownat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) gettid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000000b40), 0x0, &(0x7f00000041c0)}, 0x0) getegid() getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) 03:37:31 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @local, 0x1}, 0x10) 03:37:31 executing program 1: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000200), 0x0, 0x0) unshare(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000bc0)=0xffffffd9) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000240)={'team_slave_0\x00', @ifru_addrs=@hci}) pipe2(&(0x7f0000000200), 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000003c0)) getpid() getgroups(0x0, &(0x7f0000000780)) fcntl$getown(0xffffffffffffffff, 0x9) eventfd(0x0) getgroups(0x0, &(0x7f00000007c0)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000740), 0x0, &(0x7f0000000900)}, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000001c0)) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000000c0)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz0\x00') syz_execute_func(&(0x7f0000000500)="420f0f6f01946969ef69dc00d9f000f200008020d292000000001137370f38211ac46144e2974e2179fb12e5c4a1c9e8dc0f2e1a430f00ce068f0978e3c09f4b") 03:37:31 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:32 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) prctl$setname(0xf, &(0x7f00000007c0)='\x00') setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@remote, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, 0xe8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000740)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) syz_execute_func(&(0x7f00000005c0)="42805da0c60fef69dc0f01eece73fec4a14f5d3dfeefffff3821348af081768cc8000000f0450fc1b06590000021c4217f700922c4c39d6d1808dae5cacaf51841450f2e1ac4010d64ac1e5d31a3b744dbe2c4c17928c10703") 03:37:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:32 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:32 executing program 1: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getegid() link(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f00000016c0)}, 0x0) dup(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000240)=@l2, &(0x7f0000000100)=0x80, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000028c0)) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:37:32 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) [ 892.971981] kauditd_printk_skb: 14 callbacks suppressed [ 892.972008] audit: type=1326 audit(2000000252.420:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23560 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:32 executing program 4: mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") socket$packet(0x11, 0x0, 0x300) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pipe2(&(0x7f0000000280), 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='trusted.overlay.metacopy\x00') gettid() getpgid(0xffffffffffffffff) getpgid(0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[]}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x50, &(0x7f00000005c0)}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={&(0x7f0000000840)=ANY=[]}}, 0x0) getuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000c80)=@filter={'filter\x00', 0xe, 0x2, 0x0, [0x0, 0x20000a00, 0x20000a30, 0x20000b78], 0x0, &(0x7f00000009c0), &(0x7f0000000a00)=ANY=[]}, 0x78) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 03:37:32 executing program 3: gettid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000380), 0x8) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/70, &(0x7f0000000300)=0x46) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_execute_func(&(0x7f0000000040)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getegid() write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) fcntl$getown(0xffffffffffffffff, 0x9) 03:37:33 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:33 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) 03:37:33 executing program 1: futex(&(0x7f00000000c0), 0x9, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000004c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffffff) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/uts\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x2c4) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000940)) splice(0xffffffffffffffff, &(0x7f0000000500), 0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000380)={0x77359400}, &(0x7f0000000440), 0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004300)={{{@in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000004400)=0xe8) getgroups(0x0, &(0x7f0000004440)) getpgrp(0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) geteuid() getgroups(0x0, &(0x7f0000004680)) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000280)=""/216, 0xd8, 0x0, 0x0, 0x0) getpgrp(0x0) 03:37:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:33 executing program 4: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000007c0)=0xe8) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000009c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@dev}}, &(0x7f0000000b80)=0xe8) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001280)={{{@in6, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000d80)=0x19) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getgid() getgid() lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getgid() lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)) getgid() lsetxattr$system_posix_acl(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000480)=ANY=[], 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000240)) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f00000001c0)=0x10) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:37:33 executing program 3: gettid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bond_slave_0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001a40)={0x0, @multicast2, @local}, &(0x7f0000001a80)=0xc) clock_gettime(0x0, &(0x7f0000007fc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000007d80), 0x0, 0x0, &(0x7f0000008000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008080)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008180)={@remote}, &(0x7f00000081c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008200)={{{@in=@remote, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000008300)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000008340)={{{@in6=@local, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000008440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000008500)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@rand_addr}}, &(0x7f0000008600)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008c40)={&(0x7f00000001c0), 0xc, &(0x7f0000008c00)={&(0x7f0000000700)=ANY=[]}}, 0x0) 03:37:34 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:34 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:34 executing program 1: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@remote, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, 0xe8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000740)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) 03:37:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:34 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:34 executing program 4: inotify_init() perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 895.176844] audit: type=1326 audit(2000000254.620:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23627 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:34 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000081c0)={@broadcast, @local}, &(0x7f0000008200)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008340)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000008440)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008480)=@can, &(0x7f0000008500)=0x80) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:34 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:35 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:35 executing program 1: inotify_init() perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 03:37:35 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:35 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getegid() link(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f00000016c0)}, 0x0) dup(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000240)=@l2, &(0x7f0000000100)=0x80, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000028c0)) perf_event_open(&(0x7f0000002840)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:37:35 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:35 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:36 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:36 executing program 1: prctl$setname(0x10, &(0x7f00000000c0)='/dev/full\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(r0, 0xffffffffffffffff, r0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:36 executing program 3: mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/11) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000240)='\x00', &(0x7f0000000580)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) ptrace$peekuser(0x3, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000480)={{{@in6, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) setreuid(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffff9c, 0x0, 0x18, &(0x7f0000000340)='vboxnet1!system,(user$(\x00', 0xffffffffffffffff}, 0x30) sched_getattr(0x0, &(0x7f00000003c0), 0x30, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) syz_execute_func(&(0x7f00000006c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23416bd720dada0f38302fbae5e5e575450f2e1ac421c1f8e6c44379dfb9d6adbe90dfe2989f7f") mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setgid(0x0) accept(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000300)=0x5f) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e) 03:37:36 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:36 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:36 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:36 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:36 executing program 4: getpid() get_robust_list(0x0, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000080)={&(0x7f0000000040)}}, &(0x7f00000002c0)=0x18) io_setup(0x0, &(0x7f0000000300)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000200), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@known='trusted.overlay.impure\x00', &(0x7f0000000380)='/dev/hwrng\x00', 0xb, 0x0) sendto$inet(0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffd1e, 0x0, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a02e6969ef69dc00d9f4e37dc4e2e1a69f000000a16920375137c339392a8e0f38211a40a564a741dfe0440f01efe5e5417545800f2e1a1a01460fc46219b98100000000262e6426f30f2b05090000003f") 03:37:37 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:37 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffeac, &(0x7f0000004440)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:37:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:37 executing program 3: eventfd2(0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x0, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[]}}, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) 03:37:37 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:37 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:37 executing program 4: getrlimit(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) sendto$unix(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f470f3800c4c439582a060f38211a40a5c19084d98fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e298673640dfc2c4837d4b6d0500") 03:37:37 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:38 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:38 executing program 1: eventfd2(0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x0, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[]}}, 0x0) 03:37:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000540)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xff25, &(0x7f0000000900)="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") request_key(&(0x7f0000000280)='kgyring\x00', &(0x7f00000000c0), &(0x7f0000000040)='keyring\x00', 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") timerfd_create(0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='syzkaller0\x00', 0x10) 03:37:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:38 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) r0 = memfd_create(&(0x7f0000000040)='cpuset\x00', 0x0) fsync(r0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000080)) 03:37:38 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) [ 899.259684] audit: type=1326 audit(2000000258.710:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23778 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:38 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:37:39 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:39 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)='h', 0x1}], 0x1, &(0x7f0000000300)}, 0x24048000) [ 899.967132] audit: type=1326 audit(2000000259.410:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23794 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000002d80), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) [ 900.069219] audit: type=1326 audit(2000000259.510:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23778 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:39 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000), 0x0, &(0x7f0000000080)}, 0x0) [ 900.205457] audit: type=1326 audit(2000000259.650:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23807 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 [ 900.245860] audit: type=1326 audit(2000000259.690:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23811 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:39 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:39 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 900.767811] audit: type=1326 audit(2000000260.210:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23794 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f0000000540), &(0x7f0000000700), 0x500) 03:37:40 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 900.883337] audit: type=1326 audit(2000000260.330:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23825 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 [ 901.000080] audit: type=1326 audit(2000000260.450:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23807 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:40 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) [ 901.040424] audit: type=1326 audit(2000000260.490:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23811 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:40 executing program 3: 03:37:40 executing program 4: 03:37:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:40 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:40 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000000008001a0004000000"], 0x1}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:37:40 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:40 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) accept4(r1, &(0x7f0000000480)=@ethernet={0x0, @local}, &(0x7f00000001c0)=0xffffffffffffff14, 0x0) 03:37:40 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) [ 901.684086] audit: type=1326 audit(2000000261.130:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23825 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:41 executing program 1: keyctl$join(0x1, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:41 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000380)="68756765746c622e324d422e6d61785f75736167655f696e5f627974657300e3bb717425c82b1e14858909a46e3ebb24b2dbc74ba3808bac3e34c3f522665d77446c0cde4de30aeea0c049d7d6890a6b91730bec0a4f8a54d66c5e8d79be1d1aad5b9d531eb0ac849e4fc9e104f15306cc38f543b2465aa340720c4cbc306bc831e9bfde6dc619dea61484f3bb348e5013cada96e15c5f423b321b", 0x2, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="153f6234678dd25d766070") poll(&(0x7f0000000340)=[{r1}, {r2, 0x8000}, {r2}], 0x3, 0x0) 03:37:41 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:41 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:41 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:41 executing program 3: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000940)=""/191) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) prctl$setname(0xf, &(0x7f00000007c0)='\x00') setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@remote, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, 0xe8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x200000ac}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:41 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:41 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:41 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:41 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:41 executing program 3: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) prctl$setname(0xf, &(0x7f00000007c0)='\x00') setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@remote, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, 0xe8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000400)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:42 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:42 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:42 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:42 executing program 3: 03:37:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, 0x0, 0x0, r0}, 0x10) 03:37:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, 0x0, 0x0, r0}, 0x10) 03:37:42 executing program 3: 03:37:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, 0x0, 0x0, r0}, 0x10) 03:37:43 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:43 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) io_setup(0x0, &(0x7f0000000300)) io_submit(0x0, 0x0, &(0x7f0000000740)) 03:37:43 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:43 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, r0}, 0x10) 03:37:43 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, r0}, 0x10) 03:37:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:43 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, r0}, 0x10) 03:37:43 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:43 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:43 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:43 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:44 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:44 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:44 executing program 3: keyctl$join(0x1, &(0x7f0000000080)) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:44 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:44 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:44 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:44 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0), 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:44 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:44 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0), 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:44 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:44 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0), 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:44 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:45 executing program 3: keyctl$join(0x1, &(0x7f0000000080)) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@rc, &(0x7f00000000c0)=0x39, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:45 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:45 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:45 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:45 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000140)={0x2c, 0x1, r1, 0x0, r0}, 0x10) 03:37:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:45 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x0, r1, 0x0, r0}, 0x10) 03:37:45 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:45 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x0, r1, 0x0, r0}, 0x10) 03:37:45 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:45 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() 03:37:45 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240)={0xbd}, 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) futex(&(0x7f0000000380), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00'}) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fstat(0xffffffffffffffff, &(0x7f0000000500)) getgid() syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:45 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x0, r1, 0x0, r0}, 0x10) 03:37:46 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:46 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() 03:37:46 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00'}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, 0x0, 0x0, r0}, 0x10) 03:37:46 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00'}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, 0x0, 0x0, r0}, 0x10) 03:37:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:46 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() 03:37:46 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:46 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00'}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, 0x0, 0x0, r0}, 0x10) 03:37:46 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:46 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:46 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:46 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1}, 0x10) 03:37:46 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1}, 0x10) 03:37:46 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) io_setup(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:46 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x1, r1}, 0x10) 03:37:46 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = fcntl$dupfd(r1, 0x0, r1) open$dir(&(0x7f0000000180)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f00000000c0)=""/159) getsockopt(r0, 0x0, 0x0, &(0x7f0000000280)=""/46, &(0x7f00000002c0)=0x2e) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000380)) 03:37:47 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:47 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:47 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:47 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x26e1, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000280)) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @local}, {}, {0x2, 0x0, @multicast1}, 0x4, 0xf4, 0x0, 0x0, 0x100000000, &(0x7f0000000040)='bcsf0\x00', 0x5}) 03:37:47 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000380)={@broadcast, @rand_addr}, 0x2) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000002c0)={'team0\x00', {0x2, 0x0, @broadcast}}) 03:37:48 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:48 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @rand_addr}, 0x8) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x0) 03:37:48 executing program 4: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000140)='./file0\x00', 0x4841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r2, &(0x7f0000003080)=[{{&(0x7f00000003c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ee8caa8d101b053647486aecf6af59ef78a21863127dd953008e3d2b110deef7eb3709315ca9071768ea22b4ff33420f6e26f34d61408fce475eb01b4043f3"}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000500), 0xfffffffffffffee2}}], 0x1, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000040)=""/62) 03:37:48 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:48 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:48 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000140)='./file0\x00', 0x4841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r2, &(0x7f0000003080)=[{{&(0x7f00000003c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ee8caa8d101b053647486aecf6af59ef78a21863127dd953008e3d2b110deef7eb3709315ca9071768ea22b4ff33420f6e26f34d61408fce475eb01b4043f3"}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000500), 0xfffffffffffffee2}}], 0x1, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000500)=ANY=[]) 03:37:48 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:48 executing program 3: ioprio_set$uid(0x0, 0x0, 0x3) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_emit_ethernet(0x38388c1a16c93a4f, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000200)) socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000200)}, 0x10) clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:37:48 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:49 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:49 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:49 executing program 4: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000140)='./file0\x00', 0x4841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r2, &(0x7f0000003080)=[{{&(0x7f00000003c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ee8caa8d101b053647486aecf6af59ef78a21863127dd953008e3d2b110deef7eb3709315ca9071768ea22b4ff33420f6e26f34d61408fce475eb01b4043f3"}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000500), 0xfffffffffffffee2}}], 0x1, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000040)=""/62) 03:37:49 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:49 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:49 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:49 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:49 executing program 3: keyctl$set_reqkey_keyring(0x4, 0x3ffffffffffffe) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000480)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)='syzkaller0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='big_key\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/fuse\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000280), &(0x7f0000000300), 0x0, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000500)=""/171) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) getegid() 03:37:49 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:49 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:49 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:49 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:50 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:50 executing program 4: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) 03:37:50 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:50 executing program 3: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)}, 0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000a40)}, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040), &(0x7f0000000300)=0x8) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(0x0, 0xb) 03:37:50 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:50 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:51 executing program 2: keyctl$set_reqkey_keyring(0xb, 0x0) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:51 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:51 executing program 4: r0 = perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x70, 0x8, 0x5, 0x0, 0xff, 0x0, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x2, 0x0, 0xffffffff80000001, 0x7, 0x0, 0x1ff, 0x10001, 0x0, 0x8, 0x0, 0x3, 0x0, 0x85, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0xc08, 0x0, 0x64, 0x0, @perf_bp={&(0x7f0000000280), 0xa}, 0x2010, 0x0, 0x5, 0x0, 0x80000000, 0x0, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xfffffffffffffc01, 0x101, 0x5f, 0xfffffffffffff965, 0x0, 0x1f, 0x0, 0x1, 0xceff, 0x0, 0x0, 0x6, 0x0, 0xffff, 0x0, 0x4, 0x0, 0x4, 0x1, 0x8, 0x0, 0x5f, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x8, 0x8f1, 0x0, 0x9, 0x3, 0x0, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x10000, 0x6, 0x0, 0x7, 0x8001, 0x7, 0x6}, 0x0, 0x5, r0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r2, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x11000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) close(r1) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={"6e72300100", 0x2301}) 03:37:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:51 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000380)=0x44) r0 = getpid() r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'yam0\x00', 0x4800}) 03:37:51 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:51 executing program 4: clock_gettime(0x7, &(0x7f0000000540)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000400)=0x1c, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000440)={0x0, @aes128, 0x0, "dc031e13b685cd4a"}) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) times(&(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/174, &(0x7f00000004c0)=0xae) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:51 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:51 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:51 executing program 3: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)}, 0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000a40)}, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040), &(0x7f0000000300)=0x8) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(0x0, 0xb) 03:37:51 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:51 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:51 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:51 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:52 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:52 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:52 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:52 executing program 4: clock_gettime(0x7, &(0x7f0000000540)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000400)=0x1c, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000440)={0x0, @aes128, 0x0, "dc031e13b685cd4a"}) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) times(&(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/174, &(0x7f00000004c0)=0xae) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:52 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:52 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:52 executing program 3: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)}, 0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000a40)}, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040), &(0x7f0000000300)=0x8) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(0x0, 0xb) 03:37:52 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 913.276747] audit: type=1326 audit(2000000272.720:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24348 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:52 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:52 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 913.475970] audit: type=1326 audit(2000000272.920:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24357 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:53 executing program 2: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000005c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x90, 0xfffffffffffffff9) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) pipe2(&(0x7f00000004c0), 0x0) init_module(&(0x7f0000000180)='ppp0*+-self@\x00', 0xd, &(0x7f0000000240)=')&\'^cgroup\x00') sysinfo(&(0x7f00000003c0)=""/209) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000380)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 913.684640] audit: type=1326 audit(2000000273.130:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24362 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:37:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0x18) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)='bridge0\x00', 0xffffffffffffffff}, 0x30) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)="6e8600000000916d131f74e8000000000000000000000000") getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @dev, @dev}, &(0x7f0000000d00)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000081c0)={@broadcast, @local}, &(0x7f0000008200)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008340)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000008440)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008480)=@can, &(0x7f0000008500)=0x80) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:53 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:53 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000005c0)) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000a40)) fchdir(0xffffffffffffffff) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getegid() link(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f00000016c0)}, 0x0) dup(0xffffffffffffffff) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000004c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000500), 0x384) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000480)) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000240)=@l2, &(0x7f0000000100)=0x80, 0x0) setxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='security.capability\x00', &(0x7f0000000680)='-\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000028c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f0000000040)=0x6e) perf_event_open(&(0x7f0000002840)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000980)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0) 03:37:53 executing program 3: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)}, 0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000a40)}, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040), &(0x7f0000000300)=0x8) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(0x0, 0xb) 03:37:53 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:54 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:54 executing program 4: clock_gettime(0x7, &(0x7f0000000540)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000400)=0x1c, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000440)={0x0, @aes128, 0x0, "dc031e13b685cd4a"}) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) times(&(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/174, &(0x7f00000004c0)=0xae) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000640)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:54 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) lseek(r0, 0x0, 0x7) 03:37:54 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:54 executing program 2: getgid() getgid() getgroups(0x4000000000000021, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080), &(0x7f00000000c0)="6c6f6370757365746b657972696e675d707070313a7365637572697479fc27232e707070315d73797374656d2c7365637572697479d72c2c00", 0x0) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d060e0a00000f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:37:54 executing program 3: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)}, 0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000a40)}, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040), &(0x7f0000000300)=0x8) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 03:37:55 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:55 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:55 executing program 4: semget(0x3, 0x0, 0x0) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000001a40)='keyring\x00', &(0x7f0000000400), &(0x7f0000000440)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) keyctl$clear(0x7, 0x0) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[]}}, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semctl$IPC_RMID(0x0, 0x0, 0x0) alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f00000000c0)) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:37:55 executing program 2: clock_getres(0x0, &(0x7f0000000040)) pipe(&(0x7f0000000200)) eventfd(0x0) getrusage(0x0, &(0x7f0000000240)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000016c0)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f0000000480)={0x77359400}) pipe2(&(0x7f0000001680), 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f0000001540)=""/251, 0xfb, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001640), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140), 0x10) pipe(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_execute_func(&(0x7f0000000300)="42805da0be0fef69dc0f01eece73fec4e161763f380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:55 executing program 3: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)}, 0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000a40)}, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040), &(0x7f0000000300)=0x8) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 03:37:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:56 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:56 executing program 4: futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) accept(0xffffffffffffff9c, &(0x7f0000000240)=@in={0x2, 0x0, @dev}, &(0x7f00000002c0)=0x80) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) getpid() sched_setattr(0x0, &(0x7f0000000200), 0x0) 03:37:56 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:56 executing program 3: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)}, 0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000a40)}, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040), &(0x7f0000000300)=0x8) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 03:37:56 executing program 2: creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000004c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000440)=""/118) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) get_robust_list(0x0, &(0x7f00000000c0)=&(0x7f00000018c0)={&(0x7f0000000200)={&(0x7f0000000240)}, 0x0, &(0x7f0000000280)}, &(0x7f0000001940)=0xfffffd97) dup(0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000680)) preadv(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000001740), 0x0) eventfd2(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000003c0)) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000640)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000400)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) statfs(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=""/222) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0d10fef69dc0f01ee660f3a608600088041cb91359191c7062900770f78993d233d23410feefa6b798fc870cd68a3dfbae5e5e575450f2e1a8fe9409130c44379dfb9d6adbe90dfe2989f7f") ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 03:37:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:57 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) fcntl$getown(0xffffffffffffff9c, 0x9) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) 03:37:57 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:57 executing program 4: futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) accept(0xffffffffffffff9c, &(0x7f0000000240)=@in={0x2, 0x0, @dev}, &(0x7f00000002c0)=0x80) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000300)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) getpid() sched_setattr(0x0, &(0x7f0000000200), 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000080)) 03:37:57 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) alarm(0x0) 03:37:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) close(r0) 03:37:57 executing program 3: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)}, 0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000a40)}, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040), &(0x7f0000000300)=0x8) shmctl$SHM_LOCK(0x0, 0xb) 03:37:57 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) 03:37:58 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) [ 918.517856] audit: type=1326 audit(2000000277.960:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24489 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:58 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:58 executing program 4: fchownat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x1900) 03:37:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/raw6\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/195, 0xc3}, {&(0x7f00000003c0)=""/169, 0xa9}], 0x2, 0x0) 03:37:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") 03:37:58 executing program 3: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)}, 0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000a40)}, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040), &(0x7f0000000300)=0x8) shmctl$SHM_LOCK(0x0, 0xb) 03:37:58 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x111480, &(0x7f0000000300)=ANY=[]) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x2a6384af) unlink(&(0x7f0000000000)='./file0\x00') pwrite64(r0, &(0x7f0000000240), 0xfffffffffffffd1b, 0x0) [ 919.319425] audit: type=1326 audit(2000000278.770:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24489 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 03:37:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000440)={0x0, 0x0, 0x2080}) 03:37:58 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) [ 919.540328] vmwrite error: reg 6c0a value fffffe0000034000 (err 262144) [ 919.547505] CPU: 1 PID: 24521 Comm: syz-executor2 Not tainted 4.19.0-rc3+ #10 [ 919.554813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.564189] Call Trace: [ 919.566810] dump_stack+0x1c4/0x2b4 [ 919.570464] ? dump_stack_print_info.cold.2+0x52/0x52 [ 919.575683] ? kvm_arch_vcpu_load+0x247/0x970 [ 919.580206] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 919.585691] vmwrite_error+0x4c/0x60 [ 919.589432] vmx_vcpu_load+0xd10/0x1030 [ 919.593437] ? vmx_write_tsc_offset+0x680/0x680 [ 919.598129] ? graph_lock+0x170/0x170 [ 919.601953] ? print_usage_bug+0xc0/0xc0 [ 919.606055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.611623] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 919.616842] ? rcu_bh_qs+0xc0/0xc0 [ 919.620409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.625983] ? find_held_lock+0x36/0x1c0 [ 919.630587] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 919.636154] ? vmx_sched_in+0xe0/0x600 [ 919.640070] kvm_arch_vcpu_load+0x247/0x970 [ 919.644428] ? kvm_arch_dev_ioctl+0x630/0x630 [ 919.648946] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 919.654519] kvm_sched_in+0x82/0xa0 [ 919.658179] finish_task_switch+0x56e/0x900 [ 919.662520] ? __switch_to_asm+0x34/0x70 [ 919.666610] ? preempt_notifier_register+0x200/0x200 [ 919.671726] ? __switch_to_asm+0x34/0x70 [ 919.675803] ? __switch_to_asm+0x34/0x70 [ 919.679877] ? __switch_to_asm+0x40/0x70 [ 919.683950] ? __switch_to_asm+0x34/0x70 [ 919.688030] ? __switch_to_asm+0x40/0x70 [ 919.692107] ? __switch_to_asm+0x34/0x70 [ 919.696185] ? __switch_to_asm+0x40/0x70 [ 919.700261] ? __switch_to_asm+0x34/0x70 [ 919.704331] ? __switch_to_asm+0x34/0x70 [ 919.708402] ? __switch_to_asm+0x40/0x70 [ 919.712481] ? __switch_to_asm+0x34/0x70 [ 919.716567] ? __switch_to_asm+0x40/0x70 [ 919.720646] ? __switch_to_asm+0x34/0x70 [ 919.724720] ? __switch_to_asm+0x40/0x70 [ 919.728800] __schedule+0x874/0x1ed0 [ 919.732542] ? __sched_text_start+0x8/0x8 [ 919.736737] ? unwind_dump+0x190/0x190 [ 919.740657] ? mark_held_locks+0xc7/0x130 [ 919.744832] ? preempt_schedule_irq+0x5e/0x110 [ 919.749436] ? preempt_schedule_irq+0x5e/0x110 [ 919.754050] ? lockdep_hardirqs_on+0x421/0x5c0 [ 919.758656] ? trace_hardirqs_on+0xbd/0x310 [ 919.762995] ? unwind_get_return_address+0x61/0xa0 [ 919.767958] ? retint_kernel+0x1b/0x2d [ 919.771859] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 919.777344] preempt_schedule_irq+0x87/0x110 [ 919.781767] retint_kernel+0x1b/0x2d [ 919.785491] RIP: 0010:inode_permission+0x8e/0x560 [ 919.790346] Code: 85 fd 02 00 00 44 0f b7 6b 02 31 ff 41 83 e5 01 44 89 ee e8 84 da ad ff 66 45 85 ed 0f 84 74 02 00 00 e8 85 d9 ad ff 44 89 e6 <48> 89 df e8 4a fa ff ff 41 89 c5 e8 72 d9 ad ff 31 ff 44 89 ee e8 [ 919.809285] RSP: 0018:ffff880143bdf600 EFLAGS: 00000212 ORIG_RAX: ffffffffffffff13 [ 919.817028] RAX: 0000000000040000 RBX: ffff8801caf92300 RCX: ffffc9000265c000 [ 919.824317] RDX: 0000000000008416 RSI: 0000000000000001 RDI: 0000000000000003 [ 919.831660] RBP: ffff880143bdf630 R08: ffff88014a400500 R09: ffffed00395f247b [ 919.838946] R10: ffffed00395f247b R11: ffff8801caf923df R12: 0000000000000001 [ 919.846236] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8801caf92302 [ 919.853568] lookup_one_len_common+0x285/0x3b0 [ 919.858186] lookup_one_len+0x14c/0x220 [ 919.862198] ? lookup_one_len_unlocked+0x100/0x100 [ 919.867154] ? down_write+0x8a/0x130 [ 919.870881] ? start_creating+0xdd/0x220 [ 919.875080] ? down_read+0x1d0/0x1d0 [ 919.878807] ? mntput+0x74/0xa0 [ 919.882109] start_creating+0xf2/0x220 [ 919.886022] __debugfs_create_file+0x63/0x400 [ 919.890559] debugfs_create_file+0x57/0x70 [ 919.894820] kvm_dev_ioctl+0xbe0/0x1b10 [ 919.898817] ? is_bpf_text_address+0xac/0x170 [ 919.903371] ? kvm_debugfs_release+0x90/0x90 [ 919.907810] ? graph_lock+0x170/0x170 [ 919.911636] ? do_futex+0x249/0x26d0 [ 919.915375] ? rcu_bh_qs+0xc0/0xc0 [ 919.918939] ? rcu_bh_qs+0xc0/0xc0 [ 919.922495] ? unwind_dump+0x190/0x190 [ 919.926417] ? find_held_lock+0x36/0x1c0 [ 919.930501] ? __fget+0x4aa/0x740 [ 919.933972] ? lock_downgrade+0x900/0x900 [ 919.938139] ? check_preemption_disabled+0x48/0x200 [ 919.943182] ? kasan_check_read+0x11/0x20 [ 919.947369] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 919.952674] ? rcu_bh_qs+0xc0/0xc0 [ 919.956273] ? ksys_dup3+0x680/0x680 [ 919.960020] ? kasan_check_write+0x14/0x20 [ 919.964289] ? trace_hardirqs_off+0xb8/0x310 [ 919.968728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.974302] ? check_preemption_disabled+0x48/0x200 [ 919.979347] ? check_preemption_disabled+0x48/0x200 [ 919.984398] ? kvm_debugfs_release+0x90/0x90 [ 919.988833] do_vfs_ioctl+0x1de/0x1720 [ 919.992749] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 919.998066] ? ioctl_preallocate+0x300/0x300 [ 920.002505] ? memset+0x31/0x40 [ 920.005809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.011374] ? smack_file_ioctl+0x210/0x3c0 [ 920.015714] ? fget_raw+0x20/0x20 [ 920.019187] ? smack_file_lock+0x2e0/0x2e0 [ 920.023453] ? __x64_sys_futex+0x47f/0x6a0 [ 920.027752] ? do_syscall_64+0x9a/0x820 [ 920.031778] ? do_syscall_64+0x9a/0x820 [ 920.035798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.041369] ? security_file_ioctl+0x94/0xc0 [ 920.045802] ksys_ioctl+0xa9/0xd0 [ 920.049280] __x64_sys_ioctl+0x73/0xb0 [ 920.053199] do_syscall_64+0x1b9/0x820 [ 920.057110] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 920.062495] ? syscall_return_slowpath+0x5e0/0x5e0 [ 920.067460] ? trace_hardirqs_on_caller+0x310/0x310 [ 920.075108] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 920.080139] ? recalc_sigpending_tsk+0x180/0x180 [ 920.084908] ? kasan_check_write+0x14/0x20 [ 920.089158] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 920.094027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 920.099229] RIP: 0033:0x4572d9 [ 920.102437] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 920.121361] RSP: 002b:00007f5432fb1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 920.129097] RAX: ffffffffffffffda RBX: 00007f5432fb26d4 RCX: 00000000004572d9 [ 920.136384] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000006 [ 920.143670] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 920.150959] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 920.158239] R13: 00000000004cf660 R14: 00000000004c58bf R15: 0000000000000000 [ 920.166017] vmwrite error: reg 6c0c value fffffe0000032000 (err 262144) [ 920.172866] CPU: 1 PID: 24521 Comm: syz-executor2 Not tainted 4.19.0-rc3+ #10 [ 920.180158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.189539] Call Trace: 03:37:59 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)) getegid() syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 920.192151] dump_stack+0x1c4/0x2b4 [ 920.195797] ? dump_stack_print_info.cold.2+0x52/0x52 [ 920.201024] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 920.206516] vmwrite_error+0x4c/0x60 [ 920.210262] vmx_vcpu_load+0xcf9/0x1030 [ 920.214261] ? vmx_write_tsc_offset+0x680/0x680 [ 920.218950] ? graph_lock+0x170/0x170 [ 920.222767] ? print_usage_bug+0xc0/0xc0 [ 920.226852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.232418] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 920.237627] ? rcu_bh_qs+0xc0/0xc0 [ 920.241183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.246754] ? find_held_lock+0x36/0x1c0 [ 920.250849] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 920.256408] ? vmx_sched_in+0xe0/0x600 [ 920.260323] kvm_arch_vcpu_load+0x247/0x970 [ 920.264671] ? kvm_arch_dev_ioctl+0x630/0x630 [ 920.269183] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 920.274663] kvm_sched_in+0x82/0xa0 [ 920.278309] finish_task_switch+0x56e/0x900 [ 920.282640] ? __switch_to_asm+0x34/0x70 [ 920.286717] ? preempt_notifier_register+0x200/0x200 03:37:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x0, &(0x7f0000b63fe4), 0x1c) ioctl$sock_ifreq(r0, 0x2000000000089f7, &(0x7f0000000080)={'gre0\x00', @ifru_ivalue=0x20b17d7b}) [ 920.291838] ? __switch_to_asm+0x34/0x70 [ 920.295913] ? __switch_to_asm+0x34/0x70 [ 920.299989] ? __switch_to_asm+0x40/0x70 [ 920.304078] ? __switch_to_asm+0x34/0x70 [ 920.308150] ? __switch_to_asm+0x40/0x70 [ 920.312228] ? __switch_to_asm+0x34/0x70 [ 920.316311] ? __switch_to_asm+0x40/0x70 [ 920.320383] ? __switch_to_asm+0x34/0x70 [ 920.324461] ? __switch_to_asm+0x34/0x70 [ 920.328543] ? __switch_to_asm+0x40/0x70 [ 920.332614] ? __switch_to_asm+0x34/0x70 [ 920.336682] ? __switch_to_asm+0x40/0x70 [ 920.340760] ? __switch_to_asm+0x34/0x70 [ 920.344883] ? __switch_to_asm+0x40/0x70 [ 920.348962] __schedule+0x874/0x1ed0 [ 920.352704] ? __sched_text_start+0x8/0x8 [ 920.356864] ? unwind_dump+0x190/0x190 [ 920.360764] ? mark_held_locks+0xc7/0x130 [ 920.364922] ? preempt_schedule_irq+0x5e/0x110 [ 920.369518] ? preempt_schedule_irq+0x5e/0x110 [ 920.374124] ? lockdep_hardirqs_on+0x421/0x5c0 [ 920.378721] ? trace_hardirqs_on+0xbd/0x310 [ 920.383059] ? unwind_get_return_address+0x61/0xa0 [ 920.388001] ? retint_kernel+0x1b/0x2d [ 920.391910] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 920.397391] preempt_schedule_irq+0x87/0x110 [ 920.401835] retint_kernel+0x1b/0x2d [ 920.405560] RIP: 0010:inode_permission+0x8e/0x560 [ 920.410413] Code: 85 fd 02 00 00 44 0f b7 6b 02 31 ff 41 83 e5 01 44 89 ee e8 84 da ad ff 66 45 85 ed 0f 84 74 02 00 00 e8 85 d9 ad ff 44 89 e6 <48> 89 df e8 4a fa ff ff 41 89 c5 e8 72 d9 ad ff 31 ff 44 89 ee e8 [ 920.429330] RSP: 0018:ffff880143bdf600 EFLAGS: 00000212 ORIG_RAX: ffffffffffffff13 [ 920.437066] RAX: 0000000000040000 RBX: ffff8801caf92300 RCX: ffffc9000265c000 [ 920.444352] RDX: 0000000000008416 RSI: 0000000000000001 RDI: 0000000000000003 [ 920.451639] RBP: ffff880143bdf630 R08: ffff88014a400500 R09: ffffed00395f247b [ 920.458933] R10: ffffed00395f247b R11: ffff8801caf923df R12: 0000000000000001 [ 920.466225] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8801caf92302 [ 920.473553] lookup_one_len_common+0x285/0x3b0 [ 920.478172] lookup_one_len+0x14c/0x220 [ 920.482175] ? lookup_one_len_unlocked+0x100/0x100 [ 920.487130] ? down_write+0x8a/0x130 [ 920.490867] ? start_creating+0xdd/0x220 [ 920.495338] ? down_read+0x1d0/0x1d0 [ 920.499069] ? mntput+0x74/0xa0 [ 920.502370] start_creating+0xf2/0x220 [ 920.506276] __debugfs_create_file+0x63/0x400 [ 920.510796] debugfs_create_file+0x57/0x70 [ 920.515063] kvm_dev_ioctl+0xbe0/0x1b10 [ 920.519066] ? is_bpf_text_address+0xac/0x170 [ 920.523596] ? kvm_debugfs_release+0x90/0x90 [ 920.528040] ? graph_lock+0x170/0x170 [ 920.531862] ? do_futex+0x249/0x26d0 [ 920.535602] ? rcu_bh_qs+0xc0/0xc0 [ 920.539161] ? rcu_bh_qs+0xc0/0xc0 [ 920.542717] ? unwind_dump+0x190/0x190 [ 920.546633] ? find_held_lock+0x36/0x1c0 [ 920.550723] ? __fget+0x4aa/0x740 [ 920.554192] ? lock_downgrade+0x900/0x900 [ 920.558352] ? check_preemption_disabled+0x48/0x200 [ 920.563395] ? kasan_check_read+0x11/0x20 [ 920.567567] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 920.572872] ? rcu_bh_qs+0xc0/0xc0 [ 920.576460] ? ksys_dup3+0x680/0x680 [ 920.580200] ? kasan_check_write+0x14/0x20 [ 920.584457] ? trace_hardirqs_off+0xb8/0x310 [ 920.588893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.594454] ? check_preemption_disabled+0x48/0x200 [ 920.599486] ? check_preemption_disabled+0x48/0x200 [ 920.604537] ? kvm_debugfs_release+0x90/0x90 [ 920.608965] do_vfs_ioctl+0x1de/0x1720 [ 920.612874] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 920.618176] ? ioctl_preallocate+0x300/0x300 [ 920.622598] ? memset+0x31/0x40 [ 920.625898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.631902] ? smack_file_ioctl+0x210/0x3c0 [ 920.636238] ? fget_raw+0x20/0x20 [ 920.639708] ? smack_file_lock+0x2e0/0x2e0 [ 920.643969] ? __x64_sys_futex+0x47f/0x6a0 [ 920.648221] ? do_syscall_64+0x9a/0x820 [ 920.652215] ? do_syscall_64+0x9a/0x820 [ 920.656209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.661770] ? security_file_ioctl+0x94/0xc0 [ 920.666202] ksys_ioctl+0xa9/0xd0 [ 920.669702] __x64_sys_ioctl+0x73/0xb0 [ 920.673611] do_syscall_64+0x1b9/0x820 [ 920.677516] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 920.682910] ? syscall_return_slowpath+0x5e0/0x5e0 [ 920.687868] ? trace_hardirqs_on_caller+0x310/0x310 [ 920.692915] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 920.697956] ? recalc_sigpending_tsk+0x180/0x180 [ 920.702757] ? kasan_check_write+0x14/0x20 [ 920.707034] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 920.711909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 920.717120] RIP: 0033:0x4572d9 [ 920.720327] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 920.739248] RSP: 002b:00007f5432fb1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 920.746983] RAX: ffffffffffffffda RBX: 00007f5432fb26d4 RCX: 00000000004572d9 [ 920.754280] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000006 [ 920.761577] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 920.768864] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 920.776156] R13: 00000000004cf660 R14: 00000000004c58bf R15: 0000000000000000 [ 920.783659] vmwrite error: reg 6c10 value fffffe0000033200 (err 262144) 03:38:00 executing program 3: memfd_create(&(0x7f00000000c0)=',:security/em1securityselinux\x00', 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000600), &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)}, 0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000a40)}, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) syz_execute_func(&(0x7f00000001c0)="428055a09d878769ef69dcc482fd20acf232233333ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f3ef00fab809cc80000") ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040), &(0x7f0000000300)=0x8) shmctl$SHM_LOCK(0x0, 0xb) [ 920.790521] CPU: 1 PID: 24521 Comm: syz-executor2 Not tainted 4.19.0-rc3+ #10 [ 920.797818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.807179] Call Trace: [ 920.809786] dump_stack+0x1c4/0x2b4 [ 920.809843] ? dump_stack_print_info.cold.2+0x52/0x52 [ 920.809866] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 920.824146] vmwrite_error+0x4c/0x60 [ 920.827888] vmx_vcpu_load+0xd27/0x1030 [ 920.831897] ? vmx_write_tsc_offset+0x680/0x680 [ 920.836583] ? graph_lock+0x170/0x170 [ 920.836603] ? print_usage_bug+0xc0/0xc0 03:38:00 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0xfffffffffffffd9c) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000b00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@loopback}, &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@broadcast, @local}, &(0x7f0000001540)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @loopback, @rand_addr}, &(0x7f0000001640)=0xc) [ 920.844475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.850050] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 920.855270] ? rcu_bh_qs+0xc0/0xc0 [ 920.858838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 920.864406] ? find_held_lock+0x36/0x1c0 [ 920.868510] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 920.874072] ? vmx_sched_in+0xe0/0x600 [ 920.874098] kvm_arch_vcpu_load+0x247/0x970 [ 920.874120] ? kvm_arch_dev_ioctl+0x630/0x630 [ 920.874139] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 920.874165] kvm_sched_in+0x82/0xa0 [ 920.895944] finish_task_switch+0x56e/0x900 [ 920.900292] ? __switch_to_asm+0x34/0x70 [ 920.904390] ? preempt_notifier_register+0x200/0x200 [ 920.909514] ? __switch_to_asm+0x34/0x70 [ 920.909537] ? __switch_to_asm+0x34/0x70 [ 920.909551] ? __switch_to_asm+0x40/0x70 [ 920.909564] ? __switch_to_asm+0x34/0x70 [ 920.909577] ? __switch_to_asm+0x40/0x70 [ 920.909588] ? __switch_to_asm+0x34/0x70 [ 920.909600] ? __switch_to_asm+0x40/0x70 [ 920.909612] ? __switch_to_asm+0x34/0x70 [ 920.909630] ? __switch_to_asm+0x34/0x70 [ 920.934026] ? __switch_to_asm+0x40/0x70 [ 920.934042] ? __switch_to_asm+0x34/0x70 [ 920.934056] ? __switch_to_asm+0x40/0x70 [ 920.934069] ? __switch_to_asm+0x34/0x70 [ 920.934082] ? __switch_to_asm+0x40/0x70 [ 920.934103] __schedule+0x874/0x1ed0 [ 920.970425] ? __sched_text_start+0x8/0x8 [ 920.974604] ? unwind_dump+0x190/0x190 [ 920.978519] ? mark_held_locks+0xc7/0x130 [ 920.982705] ? preempt_schedule_irq+0x5e/0x110 [ 920.987317] ? preempt_schedule_irq+0x5e/0x110 [ 920.991951] ? lockdep_hardirqs_on+0x421/0x5c0 [ 920.996573] ? trace_hardirqs_on+0xbd/0x310 [ 921.000935] ? unwind_get_return_address+0x61/0xa0 [ 921.005902] ? retint_kernel+0x1b/0x2d [ 921.009827] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 921.015326] preempt_schedule_irq+0x87/0x110 [ 921.019766] retint_kernel+0x1b/0x2d [ 921.023510] RIP: 0010:inode_permission+0x8e/0x560 [ 921.028400] Code: 85 fd 02 00 00 44 0f b7 6b 02 31 ff 41 83 e5 01 44 89 ee e8 84 da ad ff 66 45 85 ed 0f 84 74 02 00 00 e8 85 d9 ad ff 44 89 e6 <48> 89 df e8 4a fa ff ff 41 89 c5 e8 72 d9 ad ff 31 ff 44 89 ee e8 [ 921.047331] RSP: 0018:ffff880143bdf600 EFLAGS: 00000212 ORIG_RAX: ffffffffffffff13 [ 921.055070] RAX: 0000000000040000 RBX: ffff8801caf92300 RCX: ffffc9000265c000 [ 921.062365] RDX: 0000000000008416 RSI: 0000000000000001 RDI: 0000000000000003 [ 921.069675] RBP: ffff880143bdf630 R08: ffff88014a400500 R09: ffffed00395f247b [ 921.076970] R10: ffffed00395f247b R11: ffff8801caf923df R12: 0000000000000001 [ 921.084272] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8801caf92302 [ 921.091606] lookup_one_len_common+0x285/0x3b0 [ 921.096228] lookup_one_len+0x14c/0x220 [ 921.100230] ? lookup_one_len_unlocked+0x100/0x100 [ 921.105195] ? down_write+0x8a/0x130 [ 921.108918] ? start_creating+0xdd/0x220 [ 921.112995] ? down_read+0x1d0/0x1d0 [ 921.116825] ? mntput+0x74/0xa0 [ 921.120142] start_creating+0xf2/0x220 [ 921.124069] __debugfs_create_file+0x63/0x400 [ 921.128589] debugfs_create_file+0x57/0x70 [ 921.132851] kvm_dev_ioctl+0xbe0/0x1b10 [ 921.136852] ? is_bpf_text_address+0xac/0x170 [ 921.141388] ? kvm_debugfs_release+0x90/0x90 [ 921.145836] ? graph_lock+0x170/0x170 [ 921.149667] ? do_futex+0x249/0x26d0 [ 921.153419] ? rcu_bh_qs+0xc0/0xc0 [ 921.157001] ? rcu_bh_qs+0xc0/0xc0 [ 921.160585] ? unwind_dump+0x190/0x190 [ 921.164504] ? find_held_lock+0x36/0x1c0 [ 921.168616] ? __fget+0x4aa/0x740 [ 921.172079] ? lock_downgrade+0x900/0x900 [ 921.176231] ? check_preemption_disabled+0x48/0x200 [ 921.181269] ? kasan_check_read+0x11/0x20 [ 921.185436] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 921.190726] ? rcu_bh_qs+0xc0/0xc0 [ 921.194302] ? ksys_dup3+0x680/0x680 [ 921.198046] ? kasan_check_write+0x14/0x20 [ 921.202323] ? trace_hardirqs_off+0xb8/0x310 [ 921.206767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 921.212332] ? check_preemption_disabled+0x48/0x200 [ 921.217373] ? check_preemption_disabled+0x48/0x200 [ 921.222422] ? kvm_debugfs_release+0x90/0x90 [ 921.226854] do_vfs_ioctl+0x1de/0x1720 [ 921.230770] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 921.236079] ? ioctl_preallocate+0x300/0x300 [ 921.240509] ? memset+0x31/0x40 [ 921.243818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 921.249380] ? smack_file_ioctl+0x210/0x3c0 [ 921.253724] ? fget_raw+0x20/0x20 [ 921.257221] ? smack_file_lock+0x2e0/0x2e0 [ 921.261489] ? __x64_sys_futex+0x47f/0x6a0 [ 921.265747] ? do_syscall_64+0x9a/0x820 [ 921.269755] ? do_syscall_64+0x9a/0x820 [ 921.273753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 921.279316] ? security_file_ioctl+0x94/0xc0 [ 921.283754] ksys_ioctl+0xa9/0xd0 [ 921.287237] __x64_sys_ioctl+0x73/0xb0 [ 921.291148] do_syscall_64+0x1b9/0x820 [ 921.295063] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 921.300450] ? syscall_return_slowpath+0x5e0/0x5e0 [ 921.305408] ? trace_hardirqs_on_caller+0x310/0x310 [ 921.310451] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 921.315512] ? recalc_sigpending_tsk+0x180/0x180 [ 921.320303] ? kasan_check_write+0x14/0x20 [ 921.324578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 921.329455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 921.334666] RIP: 0033:0x4572d9 [ 921.337877] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 921.356800] RSP: 002b:00007f5432fb1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 921.364544] RAX: ffffffffffffffda RBX: 00007f5432fb26d4 RCX: 00000000004572d9 [ 921.371837] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000006 [ 921.379123] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 921.386417] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 03:38:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge0\x00'}, 0xffffffffffffffbd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000004c0)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@local}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in=@multicast1}}, {{@in=@dev}}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@loopback, @dev}, &(0x7f0000000940)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000003680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003900)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a00)={{}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003b00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007b40), 0x0, 0x0, &(0x7f0000007c40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@mcast2}, &(0x7f0000007cc0)=0x14) syz_execute_func(&(0x7f0000000300)="42805da0370fef69dc0f01eece450fad8c9000000000652e2ef20f584bf2380f382166410fdd76a20000f00fbab204000000ca440f5f770ae54175450f2e1ac4010d64ac1e5d31a3b744dbe2c4a2550cfb0703") [ 921.393705] R13: 00000000004cf660 R14: 00000000004c58bf R15: 0000000000000000 [ 921.401497] kasan: CONFIG_KASAN_INLINE enabled [ 921.406283] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 921.413761] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 921.420023] CPU: 1 PID: 24521 Comm: syz-executor2 Not tainted 4.19.0-rc3+ #10 [ 921.427306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.436719] RIP: 0010:kvm_lapic_hv_timer_in_use+0x56/0xd0 [ 921.442274] Code: c1 ea 03 80 3c 02 00 75 7a 48 8b 9b e0 03 00 00 e8 bf 77 66 00 48 8d 7b 7c 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 04 84 c0 75 51 0f b6 5b 7c [ 921.461187] RSP: 0018:ffff880143bdf138 EFLAGS: 00010207 [ 921.466569] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000265c000 [ 921.473872] RDX: 000000000000000f RSI: ffffffff81185901 RDI: 000000000000007c [ 921.481159] RBP: ffff880143bdf140 R08: ffff88014a400500 R09: ffffed002924fb74 [ 921.488443] R10: ffffed002924fb74 R11: ffff88014927dba7 R12: 0000000000000001 [ 921.495725] R13: 1ffff1002877be2e R14: 0000000000000000 R15: ffff8801492780a0 [ 921.503021] FS: 00007f5432fb2700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 921.511263] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 921.517158] CR2: 00007f04d7467000 CR3: 00000001cdf53000 CR4: 00000000001426e0 [ 921.524442] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 921.531726] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 921.539000] Call Trace: [ 921.541624] kvm_arch_vcpu_load+0x516/0x970 [ 921.545971] ? kvm_arch_dev_ioctl+0x630/0x630 [ 921.550485] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 921.555964] kvm_sched_in+0x82/0xa0 [ 921.559610] finish_task_switch+0x56e/0x900 [ 921.563956] ? __switch_to_asm+0x34/0x70 [ 921.568047] ? preempt_notifier_register+0x200/0x200 [ 921.573171] ? __switch_to_asm+0x34/0x70 [ 921.577263] ? __switch_to_asm+0x34/0x70 [ 921.581335] ? __switch_to_asm+0x40/0x70 [ 921.585404] ? __switch_to_asm+0x34/0x70 [ 921.589477] ? __switch_to_asm+0x40/0x70 [ 921.593569] ? __switch_to_asm+0x34/0x70 [ 921.597647] ? __switch_to_asm+0x40/0x70 [ 921.601716] ? __switch_to_asm+0x34/0x70 [ 921.605784] ? __switch_to_asm+0x34/0x70 [ 921.609852] ? __switch_to_asm+0x40/0x70 [ 921.613926] ? __switch_to_asm+0x34/0x70 [ 921.617994] ? __switch_to_asm+0x40/0x70 [ 921.622077] ? __switch_to_asm+0x34/0x70 [ 921.626604] ? __switch_to_asm+0x40/0x70 [ 921.630684] __schedule+0x874/0x1ed0 [ 921.634416] ? __sched_text_start+0x8/0x8 [ 921.638576] ? unwind_dump+0x190/0x190 [ 921.642478] ? mark_held_locks+0xc7/0x130 [ 921.646637] ? preempt_schedule_irq+0x5e/0x110 [ 921.651233] ? preempt_schedule_irq+0x5e/0x110 [ 921.655831] ? lockdep_hardirqs_on+0x421/0x5c0 [ 921.660445] ? trace_hardirqs_on+0xbd/0x310 [ 921.664777] ? unwind_get_return_address+0x61/0xa0 [ 921.669718] ? retint_kernel+0x1b/0x2d [ 921.673619] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 921.679091] preempt_schedule_irq+0x87/0x110 [ 921.683516] retint_kernel+0x1b/0x2d [ 921.687244] RIP: 0010:inode_permission+0x8e/0x560 [ 921.692096] Code: 85 fd 02 00 00 44 0f b7 6b 02 31 ff 41 83 e5 01 44 89 ee e8 84 da ad ff 66 45 85 ed 0f 84 74 02 00 00 e8 85 d9 ad ff 44 89 e6 <48> 89 df e8 4a fa ff ff 41 89 c5 e8 72 d9 ad ff 31 ff 44 89 ee e8 [ 921.711016] RSP: 0018:ffff880143bdf600 EFLAGS: 00000212 ORIG_RAX: ffffffffffffff13 [ 921.718742] RAX: 0000000000040000 RBX: ffff8801caf92300 RCX: ffffc9000265c000 [ 921.726059] RDX: 0000000000008416 RSI: 0000000000000001 RDI: 0000000000000003 [ 921.733343] RBP: ffff880143bdf630 R08: ffff88014a400500 R09: ffffed00395f247b [ 921.740626] R10: ffffed00395f247b R11: ffff8801caf923df R12: 0000000000000001 [ 921.747927] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8801caf92302 [ 921.755242] lookup_one_len_common+0x285/0x3b0 [ 921.759848] lookup_one_len+0x14c/0x220 [ 921.763850] ? lookup_one_len_unlocked+0x100/0x100 [ 921.768797] ? down_write+0x8a/0x130 [ 921.772525] ? start_creating+0xdd/0x220 [ 921.776606] ? down_read+0x1d0/0x1d0 [ 921.780331] ? mntput+0x74/0xa0 [ 921.783623] start_creating+0xf2/0x220 [ 921.787548] __debugfs_create_file+0x63/0x400 [ 921.792057] debugfs_create_file+0x57/0x70 [ 921.796309] kvm_dev_ioctl+0xbe0/0x1b10 [ 921.800315] ? is_bpf_text_address+0xac/0x170 [ 921.804821] ? kvm_debugfs_release+0x90/0x90 [ 921.809239] ? graph_lock+0x170/0x170 [ 921.813055] ? do_futex+0x249/0x26d0 [ 921.816803] ? rcu_bh_qs+0xc0/0xc0 [ 921.820350] ? rcu_bh_qs+0xc0/0xc0 [ 921.823916] ? unwind_dump+0x190/0x190 [ 921.827814] ? find_held_lock+0x36/0x1c0 [ 921.831886] ? __fget+0x4aa/0x740 [ 921.835350] ? lock_downgrade+0x900/0x900 [ 921.839503] ? check_preemption_disabled+0x48/0x200 [ 921.844542] ? kasan_check_read+0x11/0x20 [ 921.848707] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 921.853996] ? rcu_bh_qs+0xc0/0xc0 [ 921.857573] ? ksys_dup3+0x680/0x680 [ 921.861300] ? kasan_check_write+0x14/0x20 [ 921.865556] ? trace_hardirqs_off+0xb8/0x310 [ 921.869990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 921.875551] ? check_preemption_disabled+0x48/0x200 [ 921.880578] ? check_preemption_disabled+0x48/0x200 [ 921.885612] ? kvm_debugfs_release+0x90/0x90 [ 921.890047] do_vfs_ioctl+0x1de/0x1720 [ 921.893958] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 921.899252] ? ioctl_preallocate+0x300/0x300 [ 921.903679] ? memset+0x31/0x40 [ 921.906978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 921.912546] ? smack_file_ioctl+0x210/0x3c0 [ 921.916880] ? fget_raw+0x20/0x20 [ 921.920349] ? smack_file_lock+0x2e0/0x2e0 [ 921.924607] ? __x64_sys_futex+0x47f/0x6a0 [ 921.928859] ? do_syscall_64+0x9a/0x820 [ 921.932856] ? do_syscall_64+0x9a/0x820 [ 921.936852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 921.942410] ? security_file_ioctl+0x94/0xc0 [ 921.946842] ksys_ioctl+0xa9/0xd0 [ 921.950312] __x64_sys_ioctl+0x73/0xb0 [ 921.954216] do_syscall_64+0x1b9/0x820 [ 921.958121] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 921.963503] ? syscall_return_slowpath+0x5e0/0x5e0 [ 921.968457] ? trace_hardirqs_on_caller+0x310/0x310 [ 921.973591] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 921.978628] ? recalc_sigpending_tsk+0x180/0x180 [ 921.983412] ? kasan_check_write+0x14/0x20 [ 921.987675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 921.992551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 921.997760] RIP: 0033:0x4572d9 [ 922.000971] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 922.019889] RSP: 002b:00007f5432fb1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 922.027620] RAX: ffffffffffffffda RBX: 00007f5432fb26d4 RCX: 00000000004572d9 [ 922.034929] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000006 [ 922.042220] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 922.049507] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 922.056799] R13: 00000000004cf660 R14: 00000000004c58bf R15: 0000000000000000 [ 922.064092] Modules linked in: [ 922.067451] ---[ end trace c8bdfa2936b164be ]--- [ 922.072309] RIP: 0010:kvm_lapic_hv_timer_in_use+0x56/0xd0 [ 922.077870] Code: c1 ea 03 80 3c 02 00 75 7a 48 8b 9b e0 03 00 00 e8 bf 77 66 00 48 8d 7b 7c 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 04 84 c0 75 51 0f b6 5b 7c [ 922.096982] RSP: 0018:ffff880143bdf138 EFLAGS: 00010207 [ 922.102442] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000265c000 [ 922.109830] RDX: 000000000000000f RSI: ffffffff81185901 RDI: 000000000000007c [ 922.117135] RBP: ffff880143bdf140 R08: ffff88014a400500 R09: ffffed002924fb74 [ 922.124492] R10: ffffed002924fb74 R11: ffff88014927dba7 R12: 0000000000000001 [ 922.131863] R13: 1ffff1002877be2e R14: 0000000000000000 R15: ffff8801492780a0 [ 922.139209] FS: 00007f5432fb2700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 922.142892] kobject: 'loop5' (0000000045b2c78a): kobject_uevent_env [ 922.147462] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 922.159962] CR2: 00007f04d7467000 CR3: 00000001cdf53000 CR4: 00000000001426e0 [ 922.166497] kobject: 'loop5' (0000000045b2c78a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 922.167244] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 922.184110] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 922.191485] Kernel panic - not syncing: Fatal exception [ 922.197909] Kernel Offset: disabled [ 922.201556] Rebooting in 86400 seconds..