3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000040009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1c0fe00000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100f5ffffff003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000003f0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd17fffffff0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:04 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000030009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000900000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 5: 06:44:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110008000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000700}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000c0fe0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1060000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000004000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000600000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1030000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1001100000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000070000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:04 executing program 5: 06:44:04 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1050000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000004}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110002000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000010009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1fe8000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:05 executing program 5: 06:44:05 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000fc0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110011000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000110009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000080fe0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:05 executing program 5: 06:44:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000011}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:05 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000070009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000ff0000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000300000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 5: 06:44:05 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1040000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911000a000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1050000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1fc0000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110003000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x300000a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1f5ffffff0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000020009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000080fe003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 5: 06:44:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:05 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000020009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:06 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000010009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000a0000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000030009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3001100}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:06 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000809110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000004003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000080009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 5: 06:44:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000080fe09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd17fffffff0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100fffffff5003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000003400009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000050009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:06 executing program 5: 06:44:06 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000fc000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911007fffffff003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000a000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:06 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000a00000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000409110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:06 executing program 5: 06:44:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911000000000a003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1090000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000109110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110006000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 5: 06:44:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1fec000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000007000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:07 executing program 5: 06:44:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x0) 06:44:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1003f00000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911000000befb003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000600000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x0) 06:44:07 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000040000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000005003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 5: 06:44:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100fc00000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000300000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100ff00000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 2: 06:44:07 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000800000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000006003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 2: 06:44:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:07 executing program 5: 06:44:07 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100fc00000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:07 executing program 2: 06:44:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1040000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000050000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 2: 06:44:08 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000309110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1f5ffffff0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 2: 06:44:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000030000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000909110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:08 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000003c0)=""/49) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000180)={0x2, 'syzkaller0\x00'}, 0x18) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)=""/90, &(0x7f0000000240)=0x5a) fstat(r1, &(0x7f0000000340)) ioctl$VT_RELDISP(r1, 0x5605) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fallocate(r0, 0x11, 0x0, 0x100000001) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000480)) 06:44:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000f0ffff003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000006000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1004003000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="ba2000edf22ec74427ee00660f73ff010f320f3801ba5100b800088ec80f381d6250baf80c66b8266b868966efbafc0cb80000ef3e660fe3efae", 0x3a}], 0x1, 0x0, &(0x7f0000000180), 0x0) 06:44:08 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100f5ffffff09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:08 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000200000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911000000002b003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000280)={'IDLETIMER\x00'}, &(0x7f00000002c0)=0x1e) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000400)=0x8, 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000340)=0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0xffffffffffffffe6) exit(0xe000000ffffffe4) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000000d00)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d80)=""/143, 0x8f}], 0x1, &(0x7f0000000e80)}, 0xe21f}, {{&(0x7f0000002780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002b80)=[{&(0x7f00000028c0)=""/221, 0xdd}, {&(0x7f0000002a80)=""/247, 0xf7}], 0x2, &(0x7f0000002bc0)=""/151, 0x97}, 0xa5}], 0x2, 0x100, &(0x7f0000002fc0)={0x0, 0x1c9c380}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x303) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}}, &(0x7f0000000140)='GPL\x00', 0x0, 0x1000, &(0x7f0000001080)=""/4096, 0x40f00, 0x0, [], r0, 0xf}, 0x48) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000440)="aa21f4ce465daeb03b7139fead89801d3d42e3fe5b1dd18e3db8b8b4ada910ec27d78fa961922c876de7ed43158da2448f4aedde6ab85e73") 06:44:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000070009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000700000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000002003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100fffffff509110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000340000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080)={0x7ff, 0x7}, 0x2) write$binfmt_script(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="0702202e2f76696c65"], 0x9) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000440)=0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000580)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r1, 0x30, 0x1, @in={0x2, 0x4e22, @local}}}, 0xa0) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000e80)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000000f80)=0xe8) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./control\x00', 0x1, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40), 0x0, 0x7}], 0x10, &(0x7f0000000fc0)={[], [{@euid_gt={'euid>', r2}}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e], 0x2d, [0x35, 0x7f, 0x39, 0x65], 0x2d, [0x32, 0x76, 0x66, 0x61], 0x2d, [0x66, 0x64, 0x7f, 0x39], 0x2d, [0x66, 0x31, 0x3f, 0x37, 0x30, 0x63, 0x33, 0x7f]}}}, {@subj_type={'subj_type', 0x3d, '/dev/net/tun\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'system#'}}, {@uid_eq={'uid', 0x3d, r4}}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x301001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xa0c, 0xfc, &(0x7f0000001180)="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", &(0x7f0000000340)=""/252}, 0x28) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000140)={0x6, 0x9}) connect$bt_rfcomm(r0, &(0x7f0000000540)={0x1f, {0x2, 0x7, 0x3156, 0x7}}, 0xa) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000500)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x4, 0x6, 0x1, 0x2}) 06:44:08 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000c0fe09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:08 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000788000), 0x4) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x8fee20f9e301faea, &(0x7f00000001c0)=0xff, 0x4) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000003c0)=""/49) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) r1 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r1, &(0x7f0000f50f90), 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x100000001) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000480)) 06:44:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000700000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000f00000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:08 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000009000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000080fe0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100002b0000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:09 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1001100000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) [ 867.799204] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 867.997743] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 06:44:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080)={0x7ff, 0x7}, 0x2) write$binfmt_script(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="0702202e2f76696c65"], 0x9) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000440)=0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000580)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r1, 0x30, 0x1, @in={0x2, 0x4e22, @local}}}, 0xa0) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000e80)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000000f80)=0xe8) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./control\x00', 0x1, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40), 0x0, 0x7}], 0x10, &(0x7f0000000fc0)={[], [{@euid_gt={'euid>', r2}}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e], 0x2d, [0x35, 0x7f, 0x39, 0x65], 0x2d, [0x32, 0x76, 0x66, 0x61], 0x2d, [0x66, 0x64, 0x7f, 0x39], 0x2d, [0x66, 0x31, 0x3f, 0x37, 0x30, 0x63, 0x33, 0x7f]}}}, {@subj_type={'subj_type', 0x3d, '/dev/net/tun\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'system#'}}, {@uid_eq={'uid', 0x3d, r4}}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x301001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xa0c, 0xfc, &(0x7f0000001180)="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", &(0x7f0000000340)=""/252}, 0x28) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000140)={0x6, 0x9}) connect$bt_rfcomm(r0, &(0x7f0000000540)={0x1f, {0x2, 0x7, 0x3156, 0x7}}, 0xa) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000500)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x4, 0x6, 0x1, 0x2}) 06:44:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1f5ffffff0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000090009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:09 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000ff09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000090000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:09 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000001109110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000a0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:09 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000900000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000004003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:09 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000040009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) [ 868.569917] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 06:44:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080)={0x7ff, 0x7}, 0x2) write$binfmt_script(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="0702202e2f76696c65"], 0x9) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000440)=0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000580)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r1, 0x30, 0x1, @in={0x2, 0x4e22, @local}}}, 0xa0) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000e80)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000000f80)=0xe8) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./control\x00', 0x1, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40), 0x0, 0x7}], 0x10, &(0x7f0000000fc0)={[], [{@euid_gt={'euid>', r2}}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e], 0x2d, [0x35, 0x7f, 0x39, 0x65], 0x2d, [0x32, 0x76, 0x66, 0x61], 0x2d, [0x66, 0x64, 0x7f, 0x39], 0x2d, [0x66, 0x31, 0x3f, 0x37, 0x30, 0x63, 0x33, 0x7f]}}}, {@subj_type={'subj_type', 0x3d, '/dev/net/tun\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'system#'}}, {@uid_eq={'uid', 0x3d, r4}}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x301001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xa0c, 0xfc, &(0x7f0000001180)="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", &(0x7f0000000340)=""/252}, 0x28) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000140)={0x6, 0x9}) connect$bt_rfcomm(r0, &(0x7f0000000540)={0x1f, {0x2, 0x7, 0x3156, 0x7}}, 0xa) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000500)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x4, 0x6, 0x1, 0x2}) 06:44:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000fc0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100007fffffff3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1007fffffff09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000040009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:10 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000005000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911000080fe00003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000ff000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000a00000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) [ 869.126113] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 06:44:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080)={0x7ff, 0x7}, 0x2) write$binfmt_script(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="0702202e2f76696c65"], 0x9) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000440)=0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000580)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r1, 0x30, 0x1, @in={0x2, 0x4e22, @local}}}, 0xa0) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000e80)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000000f80)=0xe8) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./control\x00', 0x1, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40), 0x0, 0x7}], 0x10, &(0x7f0000000fc0)={[], [{@euid_gt={'euid>', r2}}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e], 0x2d, [0x35, 0x7f, 0x39, 0x65], 0x2d, [0x32, 0x76, 0x66, 0x61], 0x2d, [0x66, 0x64, 0x7f, 0x39], 0x2d, [0x66, 0x31, 0x3f, 0x37, 0x30, 0x63, 0x33, 0x7f]}}}, {@subj_type={'subj_type', 0x3d, '/dev/net/tun\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'system#'}}, {@uid_eq={'uid', 0x3d, r4}}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x301001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xa0c, 0xfc, &(0x7f0000001180)="ccb1d10a52f6006330a39427a4a2e7b907d30139b027b09e020e65e6b23198e13ad4843dc525e491e21a9b9f475e96bea05884724848abac5e3d2714e7f5b2e8eed724f8bde1c4018bca86735af1f0a0d1d799c5d4345fbcc76dce6e2a235a774c3000c43696d0f14649fbc1f73cde55d2170fd9d3d88dac4717eb976224b47cc3ca74d94d980cceae5e143977b45614ac1fe4c09ee00313137ece690b819c5781ec1d9636011ec8890f58ce2d35d8aabe51e60f5d13771f67ea7849f672fac6d1db3464c9b93a7865266f1c1416c34ef1cae54fe9f2273efbaf9fc876199cc1efab880c0ddb2e966eeef0b1c16b08151a7538951402898f43575ec1d20aff774ded8df31f43bcce52954818ded488d2a6c8321b0d9a2b5f17da0c59422b3a2d013b02cb086faeed0e26b213bebda9d5d1ad4d890f521d4aafcef6b0f360c0a279368d090d91c93006f99ec45fec92cc45313fbefccfaf3933f97618868881d56fd30d8f284710d04e785cac36ad8952796c9fc58d7add33d4336f98e3a76ac8f95f6abd28f116c9fc89fe1fa46f4c24973658c0423757de5b55724e8b5aa0e356bd43b4813b0813d5ea070bd7eea983fb23d6302c38c592fa8474d747bda17ad13e52297c56b8ea759ade0ac532fb8ca930a0aea48456ee5c5490098d6b85a2c4b9f25750f6e62d4638b8454a5d359a0d6ab66c35173a93dabd852b85db0d0486b0a5625733926cda453d10073fe64d59e0e7774ef507855c6525dafb7d838efca4dd3cda129162987852b7a543aa9eb66ed0f39aebaadd463244d40954270b90ba4a4057aace594c504624bc852da2a5469fe14fb8d5ce9bda7c0dc0a96b5f7e163b91b5fd33e0ddc8211bbb6d4189a8710cbeb7d9e513dfb35f0fddce8fc427fda965ea710bc04e70d2b7f779660b217ed2b206d49e7407249de61456583afbbc2f15a10738e3a9e1c8cc407bfb72baef8217e8e0f8d081a459312e3265f5b4fce80cc7fc2a0cdbf6456c1325137492e11726010902ff026032402f79aebe561d0aee47b052054d718d07bee48032c2a87990385409f9ab15a1c3c7e7b4b7872a00ed6d53e0c3a3338bb3615e85cc566cbf0376ce53f956528e33820205b8298d45b030886d6cabcc813af0bfcb7558e2f4c62e02518d123841c8d141049a493f7bdecfc88119cb37e40540116a4180c8505e42e03912b1ab11192fbcfc7a903339bf240b872863e4f25ae1497c1127b032492be05d4bbbe9216347f59b43c5aa3c152d65c6f43a91c71dcc86a460727587b9b708bbbb8f4420c517b71ce041ae88e044cf05a46ea5e8fcd2a7239e6b3b7a2be551416cdd20fa4f55c2516a46c87eab5ef9b14648dd508fdeb885df6154c17687a430fe3f4a8e28147eee0dd4fc9f401817d3fe89007fd6b07b9e46f5aedd4d259e8eae5bbfc019615fc7d6f0055dfbcc4067dfe4b22079b1706ab0db5d5b2d2633e5db47180ad37003d9570aa8953b592eb8c894345d53667e8eaee9ca3ce9348777c9c13bd50ea576618f2e4a3945bd152f98c5ca7e8b2607dc120500abb0f6095c5cd650636ae14d16f0f1252ba792d54c1457efbb1958160a565a77aa87b42c91e48d89beeed865d779b604ec0c5cbd43f5c40da1c6a7f19451b2959dd701d7420d267e66d072f391341abcb5de638662080bd569dd4a445ac126e090d899199da07feab3a8a63e06a1b4a7cc2f2918311e34fe3bb5bc974cf9db53863684440c90faa8ec2d5d6d7cacdc0bb9ace793657e6e110186a27a890f8ba6afa514b68cda2326e6942d08b59a0225c47e545d82378f248b01945cd182c5731d46dbc410e8833de44fab17651fadc46a2329503fc1d18d841ef983776b3822ce97455b2eba28c6758ccd153ce5ccf3b88399878cc53b4e4293f326a92438a8db7299c60edbad678e4573dabe633d06ed1903d6ccff8f6203c4c8671a6c5db028a275e5cea366e6233e1c5dcf34e3a028db1021993cb00ec3afaea3da2f5babcb1b0fad4a552e05d67308ac8cde912d736d9f82f00d450b83a6e2dd3411fd6b1bf8be9d9914b31dee999947beeaf4609fb5e420420085724595f2224f2e52e7f1f8108664ed08566282ab58da11a31869b39b4b384622c1c5b9b401ceee2263c470b5a34ef4c38fd6193ebe5bcbbe1487f3741a5bfa7f0b23b83b50a621d57d51a9cf96ca5f578973e0c4e6c7184a441e7b3f8d0b59c6d3ccc20730f6c7736f3af1c75a4e7f0b60b6999ce7914b68d762e7af185ab7baa89d25076c5c3294a940de222835e885fb67a4f3bbfc9a2995a3a8b201a6f28ecee040b6de8b9ac09833134ce9b214189a3574c7a2be2414f3eb82d12ead62d7c3398abcaa0cb8ff20895c6288eb5a78861d69250f33097a95f088303e450f20ac91fc7ae4be91de3cdd6976fbdfc75ea87565f4f9ce26372912aecd0bb1f1036f3746afa49d19629fe854e17505cf8943611dfac99b06333ff44db5537b28fba91d09743fa98da641ef6a8bde585fc4899238ac4536e9abd74228f717ab5ac92c6c215d988081ab4eec200d11bbdae532b4c9f742f25bc9a1ad7ac201b4ff5d933e307710dfa36bd17aa3c04b1d0501b3012a3084ddd3d32c1b22852dd8bd900de6581326f71cf2187c779d3bf37edea13cca2ebd065e575828953ca460c50c10fdfc01c43dc20d47dc7f6cc3ea292f721d8b571cfd385e2abb5c638caa83a19db82ef83f0ef746e38a31deffe9d6294c4f079ff990d8abb7a323e4ef4d26a8bb1a118fcf346cb256078a4f3f19f376aef204d73948fb97cb56e14043fb6f29616c3ecc0e652bd660cb88939cae18d726ad53a47fd881b98a7af8757ab1b5de4df20fc1d5f9f7b1fe5b03faffa9aa2ed11c26b6011d3aba1aae8fed7bec9d6a48307415e1573354c6d000c6902b5f78b8c506691b8374e24b04d0415012404d2bc7a7ec46704542ba9abd0027eebc56c016e988522182bcd48516eef99240c6c76cb52cfe73ff37989dd0c5d3219b4d672724176ef1b5317a0cf192f935728a0259781bd4dfdcdca802f82b0603b74e7ff1c1e2c9dc88062cc31b0c781db1fdfc3525bc4ee471a7981c83b7b20bb6e357365516898a76cea9ca394939b7a47ec6725773fb2b2482ec95c54b1ad7d2220f5f0dcc8c695e0255feba8bf532a8c156eea8e263d30894cbdfa3cbf35713095fd534e08a337a1ec2e29cb741fe86db10b06afeb137d7a143e7dc8161d42a3cfcb7181ef5df748da2868c41400eca56bfce970b7493fb779884258bcc424a45dfad256ee3078f5d67749e0c78812fceafff75aa0635e513caa0e54546209c84ae48c270884da48536074f107c4fe96674c98b2931dfc7c4ac3f10f4465857c9580019fb62e71ed779c095e8712eebc8b98984bd97f09d041d9a19034dd41ba53fcb50ba0e30a97e8922c5fadf05614b8daf69d1c16d485a81d083672a7d1f64ff2666a99921b79ec3baa1b08f709cc4cab0497b0da67d8f4b2168753cb79645bb91a0157a5a837cab81d269abdfe3e3200c61d2094e77a5ded56b7d761f621adfe246c5e09c32334f27432f7676f9b0c28dce73ef817a5da9f3c19ca01828d32b1850638e8ae38f4466cbccce877de5560d46", &(0x7f0000000340)=""/252}, 0x28) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000140)={0x6, 0x9}) connect$bt_rfcomm(r0, &(0x7f0000000540)={0x1f, {0x2, 0x7, 0x3156, 0x7}}, 0xa) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000500)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x4, 0x6, 0x1, 0x2}) 06:44:10 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100fec0000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000fec000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000500000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000fffffff53a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000040030009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1110000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:10 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100fe80000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:10 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100c0fe000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) [ 869.653106] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 06:44:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110004000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000500003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000fc09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000060009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:11 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000003000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) 06:44:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000060000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000ff0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10080fe000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) 06:44:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r2}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000a09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000c0fe0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000ff3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:11 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000609110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000600000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000080fe3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:11 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000011000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000c0fe09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000080fe3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000004009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000004000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000209110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000fe8000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000003400009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:12 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000003003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000400000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000020000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000309110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000500000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000063a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000509110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000001109110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000003003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000050009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000033a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000040030009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:12 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000080fe0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:13 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000fc0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000002b00003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000ff0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000800000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000080000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000003003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000009000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000a0000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1001100000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000007000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:13 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000fe800009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000005000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000030009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:13 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000110009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000004003003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000004009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:13 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000a0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000209110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000013a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000070009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000400009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000003000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000c0fe0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000403a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000fc09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000006000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911000000ff00003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000fec00009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000ff000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000002000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000600003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000a000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:14 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000008000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:14 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000090009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100fec0000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000070000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) 06:44:15 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000011000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000300000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000053a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000fffff0003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000a000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000040009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r2}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:15 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000003000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000090000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000004000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r2}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000400000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000005000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000000a3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000409110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000110000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000fc000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000009000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r2}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000060009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000043a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000110009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000a09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000080009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000700003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000509110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000080fe09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000002c0)) r1 = getpid() ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r1, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r2}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000ff09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000fbbe00003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000011000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:16 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000080fe09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000002c0)) r1 = getpid() ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r1, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r2}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911000000f0ffff3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000060009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000006000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000090009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000700000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000fe8009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000f5ffffff3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000c0fe09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000909110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000909110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000340003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000a0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000809110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000befb3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000030009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:17 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000040009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000003f09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000900003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000befb00003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000fc0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100003f000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000002c0)) r1 = getpid() ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r1, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r3 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r2}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000a09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:18 executing program 2: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000500000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100002b0000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:18 executing program 2: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000fec009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000030000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000109110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000020009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000040003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000050009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000001100003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000309110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000fc3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000509110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000023a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000004009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000609110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:18 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000fc09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:19 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000001109110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911000000fc00003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000609110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000040000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000f00000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000070009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000900000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000fc0000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000209110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100fc00000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000050000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000309110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:19 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000809110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000a00000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000083a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:19 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000001109110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100c0fe000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000a00003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000409110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000300003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000fc000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000509110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000c0fe3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000007000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000fc09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000070911000000000000", 0x19}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100f5ffffff09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000609110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000113a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8", 0x26}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000909110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000ff09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed8", 0x2c}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000c0fe00003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100fffffff509110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000a09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000040000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847b", 0x2f}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000093a0000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10080fe000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000073a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb", 0x31}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000987ffffff0000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000900003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb", 0x31}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000200000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110040000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000093a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911000a000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911c0fe000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100fe80000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x0, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110300000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911000000f000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110900000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1007fffffff09110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000011003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x0, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd100000000000911fec0000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:21 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000a00003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:22 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110005000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000000000091100000000002b3a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<'}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000011000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:22 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110006000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000600003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) 06:44:22 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110011000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000800003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0xfbbe000000000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd10000003f0009110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) 06:44:22 executing program 4: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs={0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110500000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) 06:44:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000709110000000000003a00000000f68ab928abffb7a8d4f32ebdbed828847bbaeb4e", 0x32}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9bd, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9000, 0x2, 0x2, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x1, @perf_config_ext={0x1, 0x401}, 0x0, 0x10000, 0x0, 0x5, 0x0, 0x0, 0xfff}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r4 = geteuid() mount$9p_virtio(&(0x7f0000000300)='team\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2, &(0x7f0000000840)={'trans=virtio,', {[{@fscache='fscache'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r3}}, {@obj_user={'obj_user', 0x3d, '/dev/net/tun\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, ',vboxnet0@'}}, {@uid_gt={'uid>', r4}}, {@obj_role={'obj_role', 0x3d, "70707030637075736574656d30626465766367726f75706574683173797374656d776c616e31776c616e306d696d655f74797065f3656d307472757374656470707030"}}, {@measure='measure'}]}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @local, @remote}, &(0x7f0000000700)=0xc) setxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64EXEC\x00', &(0x7f0000000940)=',vboxnet0@', 0xa, 0x3) [ 881.071774] ================================================================== [ 881.079438] BUG: KASAN: use-after-free in rawv6_sendmsg+0x4421/0x4630 [ 881.086034] Read of size 8 at addr ffff8801c0a93bf0 by task syz-executor5/6158 [ 881.093399] [ 881.095045] CPU: 0 PID: 6158 Comm: syz-executor5 Not tainted 4.19.0-rc6+ #43 [ 881.102245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.111623] Call Trace: [ 881.114233] dump_stack+0x1c4/0x2b4 [ 881.117889] ? dump_stack_print_info.cold.2+0x52/0x52 [ 881.123116] ? printk+0xa7/0xcf [ 881.126414] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 881.131195] print_address_description.cold.8+0x9/0x1ff [ 881.136575] kasan_report.cold.9+0x242/0x309 [ 881.140993] ? rawv6_sendmsg+0x4421/0x4630 [ 881.145241] __asan_report_load8_noabort+0x14/0x20 [ 881.150201] rawv6_sendmsg+0x4421/0x4630 [ 881.154285] ? debug_check_no_obj_freed+0x305/0x58d [ 881.159334] ? rawv6_getsockopt+0x140/0x140 [ 881.163668] ? avc_has_perm+0x469/0x7e0 [ 881.167658] ? lock_downgrade+0x900/0x900 [ 881.171816] ? check_preemption_disabled+0x48/0x200 [ 881.176850] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 881.182658] ? kasan_check_read+0x11/0x20 [ 881.186823] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 881.192129] ? rawv6_recvmsg+0xea0/0xea0 [ 881.196211] ? avc_has_perm_noaudit+0x630/0x630 [ 881.200922] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 881.206472] ? _copy_from_user+0xdf/0x150 [ 881.210639] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 881.215668] ? rw_copy_check_uvector+0x310/0x3e0 [ 881.221212] inet_sendmsg+0x1a1/0x690 [ 881.225048] ? rawv6_getsockopt+0x140/0x140 [ 881.229383] ? inet_sendmsg+0x1a1/0x690 [ 881.233364] ? copy_msghdr_from_user+0x3c1/0x580 [ 881.238133] ? ipip_gro_receive+0x100/0x100 [ 881.242471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 881.248022] ? security_socket_sendmsg+0x94/0xc0 [ 881.252786] ? ipip_gro_receive+0x100/0x100 [ 881.252810] sock_sendmsg+0xd5/0x120 [ 881.252828] ___sys_sendmsg+0x7fd/0x930 [ 881.252849] ? copy_msghdr_from_user+0x580/0x580 [ 881.252881] ? __fget_light+0x2e9/0x430 [ 881.273600] ? fget_raw+0x20/0x20 [ 881.277083] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 881.282552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 881.288096] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 881.293622] ? sockfd_lookup_light+0xc5/0x160 [ 881.298108] __sys_sendmsg+0x11d/0x280 [ 881.301988] ? __ia32_sys_shutdown+0x80/0x80 [ 881.306402] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 881.312049] ? put_timespec64+0x10f/0x1b0 [ 881.316198] ? finish_task_switch+0x1f5/0x900 [ 881.320684] ? do_syscall_64+0x9a/0x820 [ 881.324647] ? do_syscall_64+0x9a/0x820 [ 881.328613] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 881.334054] __x64_sys_sendmsg+0x78/0xb0 [ 881.338282] do_syscall_64+0x1b9/0x820 [ 881.342160] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 881.347514] ? syscall_return_slowpath+0x5e0/0x5e0 [ 881.352446] ? trace_hardirqs_on_caller+0x310/0x310 [ 881.357468] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 881.362478] ? recalc_sigpending_tsk+0x180/0x180 [ 881.367268] ? kasan_check_write+0x14/0x20 [ 881.371511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 881.376360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 881.381543] RIP: 0033:0x457579 [ 881.384737] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 881.403630] RSP: 002b:00007fc5fe2a2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 881.411340] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 881.418609] RDX: 0000000000000000 RSI: 0000000020003840 RDI: 0000000000000004 [ 881.425969] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 881.433225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc5fe2a36d4 [ 881.440498] R13: 00000000004c3837 R14: 00000000004d5640 R15: 00000000ffffffff [ 881.447772] [ 881.449392] Allocated by task 6158: [ 881.453022] save_stack+0x43/0xd0 [ 881.456461] kasan_kmalloc+0xc7/0xe0 [ 881.460162] kasan_slab_alloc+0x12/0x20 [ 881.464124] kmem_cache_alloc+0x12e/0x730 [ 881.468274] dst_alloc+0xbb/0x1d0 [ 881.471716] ip6_dst_alloc+0x35/0xa0 [ 881.475414] ip6_rt_cache_alloc+0x247/0x7b0 [ 881.479728] ip6_pol_route+0x8f8/0xd90 [ 881.483607] ip6_pol_route_output+0x54/0x70 [ 881.487916] fib6_rule_lookup+0x13a/0x860 [ 881.492057] ip6_route_output_flags+0x2c5/0x350 [ 881.496721] ip6_dst_lookup_tail+0xe27/0x1d60 [ 881.501203] ip6_dst_lookup_flow+0xc8/0x270 [ 881.505519] rawv6_sendmsg+0x12d9/0x4630 [ 881.509569] inet_sendmsg+0x1a1/0x690 [ 881.513366] sock_sendmsg+0xd5/0x120 [ 881.517075] ___sys_sendmsg+0x7fd/0x930 [ 881.521034] __sys_sendmsg+0x11d/0x280 [ 881.524909] __x64_sys_sendmsg+0x78/0xb0 [ 881.528967] do_syscall_64+0x1b9/0x820 [ 881.532854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 881.538021] [ 881.539630] Freed by task 9: [ 881.542636] save_stack+0x43/0xd0 [ 881.546075] __kasan_slab_free+0x102/0x150 [ 881.550330] kasan_slab_free+0xe/0x10 [ 881.554132] kmem_cache_free+0x83/0x290 [ 881.558109] dst_destroy+0x267/0x3c0 [ 881.561823] dst_destroy_rcu+0x16/0x19 [ 881.565697] rcu_process_callbacks+0xf23/0x2670 [ 881.570356] __do_softirq+0x30b/0xad8 [ 881.574136] [ 881.575764] The buggy address belongs to the object at ffff8801c0a93b40 [ 881.575764] which belongs to the cache ip6_dst_cache of size 240 [ 881.588598] The buggy address is located 176 bytes inside of [ 881.588598] 240-byte region [ffff8801c0a93b40, ffff8801c0a93c30) [ 881.600459] The buggy address belongs to the page: [ 881.605376] page:ffffea000702a4c0 count:1 mapcount:0 mapping:ffff8801cb13ccc0 index:0x0 [ 881.613518] flags: 0x2fffc0000000100(slab) [ 881.617756] raw: 02fffc0000000100 ffffea0007635748 ffffea00074dc308 ffff8801cb13ccc0 [ 881.625642] raw: 0000000000000000 ffff8801c0a93000 000000010000000c 0000000000000000 [ 881.633521] page dumped because: kasan: bad access detected [ 881.639212] [ 881.640820] Memory state around the buggy address: [ 881.645736] ffff8801c0a93a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 881.653111] ffff8801c0a93b00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 881.660643] >ffff8801c0a93b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 881.667993] ^ [ 881.675002] ffff8801c0a93c00: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc [ 881.682358] ffff8801c0a93c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 881.689729] ================================================================== [ 881.697077] Disabling lock debugging due to kernel taint [ 881.711459] Kernel panic - not syncing: panic_on_warn set ... [ 881.711459] [ 881.718863] CPU: 0 PID: 6158 Comm: syz-executor5 Tainted: G B 4.19.0-rc6+ #43 [ 881.727428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.736770] Call Trace: [ 881.739351] dump_stack+0x1c4/0x2b4 [ 881.742991] ? dump_stack_print_info.cold.2+0x52/0x52 [ 881.748170] panic+0x238/0x4e7 [ 881.751350] ? add_taint.cold.5+0x16/0x16 [ 881.755483] ? preempt_schedule+0x4d/0x60 [ 881.759955] ? ___preempt_schedule+0x16/0x18 [ 881.764351] ? trace_hardirqs_on+0xb4/0x310 [ 881.768659] kasan_end_report+0x47/0x4f [ 881.772619] kasan_report.cold.9+0x76/0x309 [ 881.776922] ? rawv6_sendmsg+0x4421/0x4630 [ 881.781159] __asan_report_load8_noabort+0x14/0x20 [ 881.786073] rawv6_sendmsg+0x4421/0x4630 [ 881.790119] ? debug_check_no_obj_freed+0x305/0x58d [ 881.795124] ? rawv6_getsockopt+0x140/0x140 [ 881.799432] ? avc_has_perm+0x469/0x7e0 [ 881.803392] ? lock_downgrade+0x900/0x900 [ 881.807541] ? check_preemption_disabled+0x48/0x200 [ 881.812555] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 881.818338] ? kasan_check_read+0x11/0x20 [ 881.822474] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 881.827740] ? rawv6_recvmsg+0xea0/0xea0 [ 881.831791] ? avc_has_perm_noaudit+0x630/0x630 [ 881.836448] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 881.841977] ? _copy_from_user+0xdf/0x150 [ 881.846110] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 881.851113] ? rw_copy_check_uvector+0x310/0x3e0 [ 881.855862] inet_sendmsg+0x1a1/0x690 [ 881.859644] ? rawv6_getsockopt+0x140/0x140 [ 881.863954] ? inet_sendmsg+0x1a1/0x690 [ 881.867927] ? copy_msghdr_from_user+0x3c1/0x580 [ 881.872669] ? ipip_gro_receive+0x100/0x100 [ 881.876977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 881.882500] ? security_socket_sendmsg+0x94/0xc0 [ 881.887238] ? ipip_gro_receive+0x100/0x100 [ 881.891563] sock_sendmsg+0xd5/0x120 [ 881.895474] ___sys_sendmsg+0x7fd/0x930 [ 881.899439] ? copy_msghdr_from_user+0x580/0x580 [ 881.904183] ? __fget_light+0x2e9/0x430 [ 881.908139] ? fget_raw+0x20/0x20 [ 881.911586] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 881.917020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 881.922542] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 881.928059] ? sockfd_lookup_light+0xc5/0x160 [ 881.932537] __sys_sendmsg+0x11d/0x280 [ 881.936408] ? __ia32_sys_shutdown+0x80/0x80 [ 881.940798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 881.946340] ? put_timespec64+0x10f/0x1b0 [ 881.950471] ? finish_task_switch+0x1f5/0x900 [ 881.954952] ? do_syscall_64+0x9a/0x820 [ 881.958909] ? do_syscall_64+0x9a/0x820 [ 881.962870] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 881.968305] __x64_sys_sendmsg+0x78/0xb0 [ 881.972380] do_syscall_64+0x1b9/0x820 [ 881.976265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 881.981618] ? syscall_return_slowpath+0x5e0/0x5e0 [ 881.986577] ? trace_hardirqs_on_caller+0x310/0x310 [ 881.991580] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 881.996578] ? recalc_sigpending_tsk+0x180/0x180 [ 882.001316] ? kasan_check_write+0x14/0x20 [ 882.005551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.010381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 882.015552] RIP: 0033:0x457579 [ 882.018729] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 882.037714] RSP: 002b:00007fc5fe2a2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 882.045410] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 882.052668] RDX: 0000000000000000 RSI: 0000000020003840 RDI: 0000000000000004 [ 882.059921] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 882.067178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc5fe2a36d4 [ 882.074452] R13: 00000000004c3837 R14: 00000000004d5640 R15: 00000000ffffffff [ 882.082869] Kernel Offset: disabled [ 882.086498] Rebooting in 86400 seconds..