0000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VFIO_SET_IOMMU(r11, 0x3b66, 0x7) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) [ 637.874633] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 638.001449] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pig=2419 comm=syz-executor.1 [ 638.436199] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:33 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x9) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r11 = socket$inet(0x2, 0x4000000805, 0x0) r12 = socket$inet_sctp(0x2, 0x5, 0x84) r13 = dup3(r11, r12, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r12, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r13, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r12, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r13, 0x84, 0x72, &(0x7f000059aff8)={r14}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r10, 0x84, 0x76, &(0x7f0000000240)={r14}, &(0x7f0000000540)=0x8) r15 = socket$netlink(0x10, 0x3, 0xc) writev(r15, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r10, 0x0, r15, 0x0, 0x422000a7b, 0x0) bind$isdn_base(r10, &(0x7f0000000140)={0x22, 0x7f, 0x5, 0x80, 0x5}, 0x6) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r16, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r16}]}, 0x174}}, 0x0) [ 638.525217] sp0: Synchronizing with TNC [ 638.538585] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:55:33 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00', 0x85, 0x0, 0xfffffffd}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'veth1_to_bridge\x00', 0x20}) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:55:33 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000140)={0x4, 0x5, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'team0\x00'}) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x8) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 638.834588] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 638.965545] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pig=2479 comm=syz-executor.1 15:55:34 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x41, 0x1, 0x1}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="58000000856ea5e967362080121c87b396606a57dcb78febdedec823111d4e8a43aa8d79494e82fc3ef82a4f8502cccd2b2477bd6a086451c82e2f6b414570f24deeaa24008e78208b0527602d44493f750c16e48080043d16f5ad325bd8590715853852927e22d03f96055e8640c253b5e4290560b325ad1116b66e5f241ac4b0a95dac83f7792cc815c18cd270e51204e89f35568bd64d3ed0cd2409c4138943845bbcac3ee9e26b4089495a32d01eb2db3e708b2258624272", @ANYRES16=r5, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 639.403428] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:55:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@generic={0x0, 0xb8cc, 0x9}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000040)={0x2, 0x10000}) close(r0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:55:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 640.274995] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 640.418735] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 640.427466] sp0: Synchronizing with TNC 15:55:35 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) r2 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x101, 0x101200) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000740)={0x0, 0x7, 0x7, [], &(0x7f0000000500)={0x99096d, 0x80000001, [], @string=&(0x7f0000000240)=0x46}}) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r5, 0x400455c8, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000001c0)) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000780)={0xfffffffb, [[0x5, 0x3, 0xac, 0x1d51, 0x9, 0x101, 0x3, 0x10000], [0xffff0738, 0x401, 0x2, 0xffffff80, 0x10000, 0x9, 0xb4], [0x10000, 0x882, 0xa8, 0x1000, 0x9, 0xf99, 0xfff, 0x2]], [], [{0x0, 0x3, 0x2}, {0x8, 0x9, 0x2}, {0xa8ea, 0x7, 0x8}, {0x8ed, 0x0, 0x1699}, {0xfffffff8, 0x5, 0x80000000}, {0x1d, 0x2, 0xf4}, {0x1000, 0x0, 0x3}, {0x1000, 0x7, 0x7fffffff}, {0x7f, 0x2, 0x4}, {0x4, 0x6, 0x8}, {0x2785, 0x54, 0x9}, {0x4, 0x0, 0x3}], [], 0x8}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x917be393c9c9ea45, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r7, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="48010000190010002cbd7000fbdbdf251c8010007f00fd03000800000c00090001000300", @ANYRES32=r12, @ANYBLOB="840013000000000000000000000000000000000000000000000008000000000000000f00000000000000000000000200000f0f0000020f00000f0f0000000f000000000000000100000f0f000000000000000000000000000000000000000f0000000000000f0f00000000000000080000000000000000000000000000000000000000000800010000000000080001000000090008000100000000008400130000000f000000000000070c00000000dae97000000f0f000000000000000000000004000096e7ed40f18fbe4fe100000000000000000040000000000000000000000007000000000000000a0000000000000000000000000000000000000000000000000000000a0000000f000000000000000000000009000000040000000000"], 0x148}}, 0x0) [ 640.579051] sp1: Synchronizing with TNC [ 640.834153] Bluetooth: hci0: Frame reassembly failed (-84) 15:55:35 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d7261770f686173683d67686173682d63250000000000000000000000000000000000004f2f00000000000000000000000000000700000000000000000000000040000000000000001004380bd737609d9afd280000957c9509d097ba3b287341baad382f83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140)={0x7, 0x1bd9}, 0xc) r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x125280, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 640.971519] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@generic={0x0, 0xb8cc, 0x9}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000040)={0x2, 0x10000}) close(r0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:55:36 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x50700, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d7261772068e173683d67686173682863650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x168, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x140, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x130, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x168}}, 0x0) r11 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r12 = request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r12, 0x0) keyctl$unlink(0x9, r11, r12) [ 642.004614] sp0: Synchronizing with TNC [ 642.029851] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 642.038568] sp1: Synchronizing with TNC [ 642.835910] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 642.870123] Bluetooth: hci0 command 0x1003 tx timeout [ 642.875517] Bluetooth: hci0 sending frame failed (-49) 15:55:37 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140)={0x6, 0x9, 0x7, 0x7}, 0x10) r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:55:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@generic={0x0, 0xb8cc, 0x9}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000040)={0x2, 0x10000}) close(r0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:55:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x7) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) pipe(0x0) ioperm(0x7b3, 0x8001, 0x7) socket$netlink(0x10, 0x3, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 643.134476] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:55:38 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r11 = socket$netlink(0x10, 0x3, 0xc) writev(r11, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r10, 0x0, r11, 0x0, 0x422000a7b, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r10, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000240)=0x40) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) [ 643.859003] sp0: Synchronizing with TNC [ 643.867307] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 643.912782] sp1: Synchronizing with TNC [ 644.512167] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 644.709961] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 644.950151] Bluetooth: hci0 command 0x1001 tx timeout [ 644.955516] Bluetooth: hci0 sending frame failed (-49) 15:55:40 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000540)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d636500000000000000ddae00000000000000000000004f2f00000000000000000000000000000000000000000000000000000004380bd737609d9a6b01cbd87271950b06b7d63d0d6b6f59a197e82b09d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:55:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x400, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:55:40 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) r2 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x101, 0x101200) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000740)={0x0, 0x7, 0x7, [], &(0x7f0000000500)={0x99096d, 0x80000001, [], @string=&(0x7f0000000240)=0x46}}) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r5, 0x400455c8, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000001c0)) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000780)={0xfffffffb, [[0x5, 0x3, 0xac, 0x1d51, 0x9, 0x101, 0x3, 0x10000], [0xffff0738, 0x401, 0x2, 0xffffff80, 0x10000, 0x9, 0xb4], [0x10000, 0x882, 0xa8, 0x1000, 0x9, 0xf99, 0xfff, 0x2]], [], [{0x0, 0x3, 0x2}, {0x8, 0x9, 0x2}, {0xa8ea, 0x7, 0x8}, {0x8ed, 0x0, 0x1699}, {0xfffffff8, 0x5, 0x80000000}, {0x1d, 0x2, 0xf4}, {0x1000, 0x0, 0x3}, {0x1000, 0x7, 0x7fffffff}, {0x7f, 0x2, 0x4}, {0x4, 0x6, 0x8}, {0x2785, 0x54, 0x9}, {0x4, 0x0, 0x3}], [], 0x8}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x917be393c9c9ea45, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r7, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="48010000190010002cbd7000fbdbdf251c8010007f00fd03000800000c00090001000300", @ANYRES32=r12, @ANYBLOB="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"], 0x148}}, 0x0) [ 645.295033] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 645.540615] sp0: Synchronizing with TNC 15:55:40 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) fstat(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket(0x9, 0x803, 0x0) r6 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000001640)={0x0, 0x0, 0x0}, &(0x7f0000001680)=0xc) sendmsg$unix(r5, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}], 0x20}, 0x0) keyctl$chown(0x4, r1, r4, r7) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000540)) r8 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r10 = socket$netlink(0x10, 0x3, 0xc) writev(r10, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r9, 0x0, r10, 0x0, 0x422000a7b, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000240)={r11}) getsockopt$inet_sctp6_SCTP_EVENTS(r12, 0x84, 0xb, &(0x7f0000000680), &(0x7f00000007c0)=0xb) r13 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x1ff) sendmsg$TEAM_CMD_OPTIONS_SET(r8, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="58000000e72f157461d03bcc42520896429c6301", @ANYRES16=r13, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r14, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket(0x10, 0x800, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r18, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r15, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="00000000000000004c0112000c000100697036746e6c00003c010200080008000502c52e8ede000000080011004e240000080011004e20000004001300080007000300008014000300ff0200000000000000000000000000011400030043739fee2404ff42b120dede2d7dbfda08000900040000000800090004000000080009000400000014000300ff010000000000000000000000000001080007000400000008000900040000000800060008000000080008001c000000080008000f0000000400130008000500ed0000000800140087f1000014000200fe8000000000000000000000000000110800070009000000080008002700000014000300fe8000000000000000000000000000aa080007000700000008000800330000000800070002000000080006000900000014000200fe8000000000000000000000000000bb08000700010000000800070004000000080008002d00000008000a00", @ANYRES32=r18], 0x174}}, 0x0) [ 646.200744] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 646.302332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2665 comm=syz-executor.4 [ 646.319461] bond547 (uninitialized): Released all slaves [ 646.483188] sp0: Synchronizing with TNC [ 647.030099] Bluetooth: hci0 command 0x1009 tx timeout 15:55:46 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) r2 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x101, 0x101200) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000740)={0x0, 0x7, 0x7, [], &(0x7f0000000500)={0x99096d, 0x80000001, [], @string=&(0x7f0000000240)=0x46}}) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r5, 0x400455c8, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000001c0)) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000780)={0xfffffffb, [[0x5, 0x3, 0xac, 0x1d51, 0x9, 0x101, 0x3, 0x10000], [0xffff0738, 0x401, 0x2, 0xffffff80, 0x10000, 0x9, 0xb4], [0x10000, 0x882, 0xa8, 0x1000, 0x9, 0xf99, 0xfff, 0x2]], [], [{0x0, 0x3, 0x2}, {0x8, 0x9, 0x2}, {0xa8ea, 0x7, 0x8}, {0x8ed, 0x0, 0x1699}, {0xfffffff8, 0x5, 0x80000000}, {0x1d, 0x2, 0xf4}, {0x1000, 0x0, 0x3}, {0x1000, 0x7, 0x7fffffff}, {0x7f, 0x2, 0x4}, {0x4, 0x6, 0x8}, {0x2785, 0x54, 0x9}, {0x4, 0x0, 0x3}], [], 0x8}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x917be393c9c9ea45, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r7, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="48010000190010002cbd7000fbdbdf251c8010007f00fd03000800000c00090001000300", @ANYRES32=r12, @ANYBLOB="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"], 0x148}}, 0x0) 15:55:46 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) r2 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x101, 0x101200) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000740)={0x0, 0x7, 0x7, [], &(0x7f0000000500)={0x99096d, 0x80000001, [], @string=&(0x7f0000000240)=0x46}}) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r5, 0x400455c8, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000001c0)) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000780)={0xfffffffb, [[0x5, 0x3, 0xac, 0x1d51, 0x9, 0x101, 0x3, 0x10000], [0xffff0738, 0x401, 0x2, 0xffffff80, 0x10000, 0x9, 0xb4], [0x10000, 0x882, 0xa8, 0x1000, 0x9, 0xf99, 0xfff, 0x2]], [], [{0x0, 0x3, 0x2}, {0x8, 0x9, 0x2}, {0xa8ea, 0x7, 0x8}, {0x8ed, 0x0, 0x1699}, {0xfffffff8, 0x5, 0x80000000}, {0x1d, 0x2, 0xf4}, {0x1000, 0x0, 0x3}, {0x1000, 0x7, 0x7fffffff}, {0x7f, 0x2, 0x4}, {0x4, 0x6, 0x8}, {0x2785, 0x54, 0x9}, {0x4, 0x0, 0x3}], [], 0x8}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x917be393c9c9ea45, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r7, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="48010000190010002cbd7000fbdbdf251c8010007f00fd03000800000c00090001000300", @ANYRES32=r12, @ANYBLOB="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"], 0x148}}, 0x0) 15:55:46 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e1d}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0xfffffffffffffead, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TTL={0x0, 0x4, 0x9}, @IFLA_IPTUN_FWMARK={0xffffffffffffffca, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}, 0x1, 0x0, 0x0, 0x40080}, 0x0) 15:55:46 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[]}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x178, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x150, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x140, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1f}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x178}}, 0x0) 15:55:46 executing program 2: r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) r1 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000040)) close(r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = gettid() r6 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="41e2"], 0x2) prctl$PR_SET_PTRACER(0x59616d61, r5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x0, 0x7, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 651.647456] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 651.705357] Bluetooth: hci0 sending frame failed (-49) [ 651.724125] sp0: Synchronizing with TNC 15:55:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev\x00\x00vi\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6erspan0\x00', 0x20}) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x5ac9fe93c63e2fa8, 0x0) ioctl$sock_inet_udp_SIOCINQ(r6, 0x541b, &(0x7f0000000040)) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r7, 0x40505330, &(0x7f0000000040)) fcntl$getown(r7, 0x9) r8 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r8, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 652.375340] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.0'. [ 652.452260] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 15:55:47 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000240)={0xe09b637518f3238f, 0x25, &(0x7f0000000140)="ad26f88f192d0e2568a2f077fcd774246009fdcfc120e9ddb926688c308448e9c03196fd03"}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r2 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r2, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) [ 652.526916] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 652.737468] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 652.746387] sp1: Synchronizing with TNC 15:55:47 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r11 = socket$netlink(0x10, 0x3, 0xc) writev(r11, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r10, 0x0, r11, 0x0, 0x422000a7b, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r11, 0x8917, &(0x7f0000000140)={'veth0\x00', {0x2, 0x4e21, @remote}}) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r14 = getpgrp(r13) fcntl$lock(r0, 0x26, &(0x7f0000000540)={0x0, 0x0, 0x800000000000000, 0x1, r14}) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) [ 652.888332] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.0'. 15:55:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r3 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x80800) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x45, 0x4001, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x82000, 0x0) connect$bt_l2cap(r10, &(0x7f0000000540)={0x1f, 0x7, {0x0, 0x3, 0x23, 0x24, 0x1, 0x32}, 0xb0, 0x5}, 0xe) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) [ 653.287102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2765 comm=syz-executor.4 [ 653.436684] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:55:48 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000240)={0xe09b637518f3238f, 0x25, &(0x7f0000000140)="ad26f88f192d0e2568a2f077fcd774246009fdcfc120e9ddb926688c308448e9c03196fd03"}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r2 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r2, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) [ 653.750071] Bluetooth: hci0 command 0x1003 tx timeout [ 653.755459] Bluetooth: hci0 sending frame failed (-49) [ 653.872869] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2766 comm=syz-executor.4 [ 653.985989] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 654.071877] sp1: Synchronizing with TNC [ 654.079923] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 654.156418] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:49 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x105000, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r5, 0x80045006, &(0x7f0000000240)) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r7, @ANYBLOB="3c00020038000100240001006d638100000072656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:55:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:55:49 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000240)={0xe09b637518f3238f, 0x25, &(0x7f0000000140)="ad26f88f192d0e2568a2f077fcd774246009fdcfc120e9ddb926688c308448e9c03196fd03"}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r2 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r2, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) [ 655.830123] Bluetooth: hci0 command 0x1001 tx timeout [ 655.835423] Bluetooth: hci0 sending frame failed (-49) [ 657.910133] Bluetooth: hci0 command 0x1009 tx timeout 15:55:57 executing program 1: 15:55:57 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$VIDIOC_QUERYCTRL(r3, 0xc0445624, &(0x7f0000000540)={0x42, 0x101, "92de55b978911ae5a2f0f2090d7a0e839180a0010eeddfaebdb95d2c1d517c6e", 0x80000001, 0x8c, 0x6, 0x0, 0x20}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000500)=0xe8) keyctl$chown(0x4, r7, r8, 0xffffffffffffffff) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x134, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xfc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0xfffffec7, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x134}}, 0x0) 15:55:57 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000880)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004fb50a2f000000000000000000000000000000000000000000000000e7000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x800000, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000900)={{0x2, 0x4e23, @local}, {0x0, @dev={[], 0x10}}, 0x20, {0x2, 0x4e20, @empty}, 'bond_slave_1\x00'}) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r12 = socket$netlink(0x10, 0x3, 0xc) writev(r12, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r11, 0x0, r12, 0x0, 0x422000a7b, 0x0) r13 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7fffffff, 0x400000) r14 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r13, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x98, r14, 0x402, 0x70bd2a, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x4, 0x2}}]}, 0x98}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$DEVLINK_CMD_GET(r12, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000740)={0x128, r14, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x128}, 0x1, 0x0, 0x0, 0x2cdc245c924b888b}, 0x4) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c00000010007c065f547f8e850600000000000000", @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x180, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x158, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x148, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @empty}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x180}}, 0x0) 15:55:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x8) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000040)) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f00000000c0)=0x20) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) pipe(0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet6_mreq(r7, 0x29, 0x0, &(0x7f0000000100)={@initdev, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000180)={@mcast1, 0x64, r8}) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r11, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) write$binfmt_script(r11, &(0x7f00000003c0)={'#! ', './file0', [{0x20, ':GPLs}bdev:ppp0vmnet0eth0&selinuxkeyringppp1'}, {0x20, '/dev/ptmx\x00'}, {0x20, 'em0nodev'}, {0x20, '/dev/ptmx\x00'}], 0xa, "3371b6e545e4795f808b66e7f061be8bb58ce842fe8c9cf4cf33c712d1b142e718ed0112509199bd545ab399961313e541667def600012856a7faadade802be997ce3808dfce00cda6be8d9bc3a51ef8c69f22bf6135c1237facec0b63198561379cbf5760bb11b5f805f6c2652ee07d0d94b18e6ad869ce982db8a7fccfb78efe7b2d6c1bc20083363bd80da5c78c1be76f0945de50f0783584ea49df8b472cc14ac94a488f207a7a1317e7369dd09f6c26f859f804f1238f0baf8b5a58080fcad3b8368210bd49d0"}, 0x120) write$binfmt_elf64(r10, &(0x7f0000000000)=ANY=[], 0xffb4) bind$pptp(r10, &(0x7f0000000040)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r12, &(0x7f0000000000)=ANY=[], 0xffb4) connect$can_bcm(r12, &(0x7f00000001c0)={0x1d, r8}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r9, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r13 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r13, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:55:57 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x800}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="01000000", @ANYRES16=r5, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000740)={'nat\x00'}, &(0x7f0000000240)=0x54) r9 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r11 = socket$netlink(0x10, 0x3, 0xc) writev(r11, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r10, 0x0, r11, 0x0, 0x422000a7b, 0x0) ioctl$CAPI_CLR_FLAGS(r10, 0x80044325, &(0x7f0000000140)=0x1) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYBLOB="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", @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="7401000010001fff00000000d9881f060000000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r14], 0x174}}, 0x0) 15:55:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000080), 0x4) [ 662.551408] nla_parse: 5 callbacks suppressed [ 662.551415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 663.324335] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 663.434480] netlink: 340 bytes leftover after parsing attributes in process `syz-executor.0'. 15:55:58 executing program 3: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1641, 0xfffffffffffffff7, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) r4 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x2001}) [ 663.650727] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 663.659311] netlink: 340 bytes leftover after parsing attributes in process `syz-executor.0'. 15:55:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$KDADDIO(r0, 0x4b35, 0x3c4) pipe(&(0x7f00000008c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='o']) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) write$FUSE_DIRENTPLUS(r2, &(0x7f00000007c0)={0x10, 0x0, 0x2}, 0x10) [ 663.739908] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 663.754817] audit: type=1400 audit(1576166158.773:90): avc: denied { block_suspend } for pid=2858 comm="syz-executor.3" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 15:55:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:55:59 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={0x0, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r1 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r1, 0xab2ee000) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) lseek(r4, 0x0, 0x1) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpid() ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x100000000, 0x410000) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x900, 0x0, 0x25dfdbff, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 664.072963] sp1: Synchronizing with TNC 15:55:59 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup2(r12, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) recvmsg$kcm(r14, &(0x7f0000002640)={&(0x7f0000000040)=@can={0x1d, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000140)}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000002bc0)=""/249, 0xf9}], 0x6, &(0x7f0000002540)=""/239, 0xef}, 0x2061) ioctl$sock_inet6_SIOCADDRT(r11, 0x890b, &(0x7f0000002680)={@empty, @mcast2, @mcast2, 0x4, 0x8, 0x20, 0x100, 0x9, 0x841803c7, r15}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000940)=@newlink={0x180, 0x10, 0xffffff1f, 0x80, 0x0, {}, [@IFLA_BROADCAST={0x0, 0x2, @broadcast}, @IFLA_WEIGHT={0x0, 0xf, 0x5}, @IFLA_MASTER={0x0, 0xa, r15}, @IFLA_VF_PORTS={0x0, 0x18, [{0x0, 0x1, [@IFLA_PORT_VF={0x0, 0x1, 0xc33d}, @IFLA_PORT_HOST_UUID={0x0, 0x5, "e26e8edeaf0bd2d29bb08134c8d00a1a"}, @IFLA_PORT_REQUEST]}, {0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x0, 0x4, "e91b815ff817076ebb455a2207810b56"}, @IFLA_PORT_REQUEST={0x0, 0x6, 0x2}]}, {0x0, 0x1, [@IFLA_PORT_REQUEST={0x0, 0x6, 0x1}, @IFLA_PORT_INSTANCE_UUID={0x0, 0x4, "823a4510ce26c1232a5c3fb909078278"}, @IFLA_PORT_HOST_UUID={0x0, 0x5, "3abe9e77190186176ffa1a502189a083"}, @IFLA_PORT_INSTANCE_UUID={0x0, 0x4, "76a98dac7c76b6b35d9e06a4e4250b26"}, @IFLA_PORT_HOST_UUID={0x0, 0x5, "dc411c693c1d296f3ccc5c276140f53d"}, @IFLA_PORT_HOST_UUID={0x0, 0x5, "7baac1f4a7177ecd347cbaa3c225465b"}]}, {0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x0, 0x4, "1d7131c88fb8e1af03ab7d60d75987e9"}]}, {0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x0, 0x4, "bd6d95b0d828f7eb43b1a421c6f02b82"}, @IFLA_PORT_HOST_UUID={0x0, 0x5, "ef31bbf0171bff94d26335118f3d4d6f"}, @IFLA_PORT_PROFILE={0x0, 0x2, 'team\x00'}, @IFLA_PORT_HOST_UUID={0x0, 0x5, "93415150d8f4d4f3771f0ffb7943d47f"}, @IFLA_PORT_REQUEST={0x0, 0x6, 0x1}, @IFLA_PORT_PROFILE={0x0, 0x2, 'vboxnet1eth1security*eth1loproc\x00'}, @IFLA_PORT_INSTANCE_UUID={0x0, 0x4, "a6a29d0fdbcd7cf3d314e476e6e4695e"}]}]}, @IFLA_PROMISCUITY={0x0, 0x1e, 0x3ff}, @IFLA_BROADCAST={0x0, 0x2, @random="daffc7723ba6"}]}, 0xffffffffffffff05}}, 0x0) 15:55:59 executing program 3: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1641, 0xfffffffffffffff7, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) r4 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x2001}) 15:55:59 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1641, 0xfffffffffffffff7, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) r4 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x2001}) [ 665.238411] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:00 executing program 3: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1641, 0xfffffffffffffff7, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timerfd_settime(r2, 0x1, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) r4 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)={0x2001}) 15:56:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2cf7a6a2}, 0x144a5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) setxattr$smack_xattr_label(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)='security.SMACK64IPOUT\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="0082696e3100"], 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="1cc9000024002d000000000000400800105f5f514e9604004950096b410900000000b14bf4f83d056b7d0beef53fdec4e4b3115706e71220a2025229003b20ba94fd1ae5ed65b22475"], 0x1c}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) clock_gettime(0x4, &(0x7f0000000040)) ioprio_set$pid(0x2, 0x0, 0x7e39) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 665.899296] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 666.010492] sp1: Synchronizing with TNC 15:56:01 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f000000000000000000000000000000ff000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5fc8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x5d}}, 0x0) 15:56:01 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 666.517658] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:01 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x800000ffff, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, @stepwise}) 15:56:01 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x312080, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$EVIOCRMFF(r4, 0x40044581, &(0x7f0000000240)=0x1) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet6_tcp_buf(r9, 0x6, 0xb, &(0x7f0000000740)=""/4096, &(0x7f0000000140)=0x1000) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c000000100085060000000100000000000000000675e25c96e16f72cd9f117d5995c6df9e5d4eb5a6bafb7571db4df14c09f293f6c61cfd37fffed889c4a3c04fd2dfdfef", @ANYRES32=r13, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000018c0)=@newlink={0x168, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x140, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x130, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_LOCAL={0x0, 0x2, @ipv4={[], [], @broadcast}}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @dev={0xfe, 0x80, [], 0x13}}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_REMOTE={0x0, 0x3, @dev={0xfe, 0x80, [], 0x29}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @IFLA_IPTUN_PROTO, @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x0, 0x7, 0x5}]]}}}, @IFLA_MASTER={0x8, 0xa, r13}]}, 0x168}}, 0x0) 15:56:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'em1', 0x20, 0xdfc}, 0x2a, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x7) [ 667.233210] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:02 executing program 1: r0 = gettid() write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xffffffffffffff22) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) r2 = memfd_create(&(0x7f0000000000)='mime_type(eth1\x00', 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x4}) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000015) [ 667.409578] encrypted_key: keyword 'new' not allowed when called from .update method [ 667.551287] encrypted_key: keyword 'new' not allowed when called from .update method 15:56:02 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="ff03", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:56:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32, @ANYBLOB="00080080000000000300000008000100753332005800020014000500000000000000000045f12b3b524b5a7ffc969a343144e10000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf0970f1461cb1046e00000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) 15:56:03 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000540)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f0000000000000000000000000000001e000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6bc47974c1321e51ea8438d5f009d36efd1d83fa61d8c0662c972715ed2f20cdc1"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400400, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000240), 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600)={0x7fff, 0x7, 0x80000000, 0x8000, 0x7}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$sock_rose_SIOCADDRT(r9, 0x890b, &(0x7f00000007c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f0000000840)={0x58, r6, 0x1, 0x0, 0x4, {}, [{{0x8, 0x1, r7}, {0xffbd, 0x2, [{0x38, 0x1, @lb_tx_method={{0x0, 0x1, 'lb_tx_method\x00'}, {0xffffffffffffffe9}, {0x0, 0x4, 'hash\x00'}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r13, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x11c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xf4, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xe4, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x78}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r13}]}, 0x11c}}, 0x20000000) 15:56:03 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r0, &(0x7f0000000400)="260000002200470508d258002b1f00eb0101c7033500b000"/38, 0x26) setsockopt$sock_int(r0, 0x1, 0x20800000000008, &(0x7f0000000280), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x4000000000003, 0x2, @thr={0x0, 0x0}}) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r3, 0x15) [ 668.693271] nla_parse: 5 callbacks suppressed [ 668.693278] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:03 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x20, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x4}}]}, 0x20}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:56:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/\x01\x00\x00\x00\x01\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r5 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r6 = dup3(r4, r5, 0x1c0000) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$inet6_mreq(r10, 0x29, 0x1c, &(0x7f0000000440)={@mcast2, 0x0}, &(0x7f0000000480)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000004c0)={@initdev, 0x0}, &(0x7f0000000500)=0x14) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r16 = dup2(r14, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) recvmsg$kcm(r16, &(0x7f0000002640)={&(0x7f0000000040)=@can={0x1d, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000140)}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000002bc0)=""/249, 0xf9}], 0x6, &(0x7f0000002540)=""/239, 0xef}, 0x2061) ioctl$sock_inet6_SIOCADDRT(r13, 0x890b, &(0x7f0000002680)={@empty, @mcast2, @mcast2, 0x4, 0x8, 0x20, 0x100, 0x9, 0x841803c7, r17}) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r18, &(0x7f0000000000)=ANY=[], 0xffb4) recvmmsg(r18, &(0x7f0000001700)=[{{&(0x7f0000000540)=@isdn, 0x80, &(0x7f0000000900)=[{&(0x7f00000005c0)=""/199, 0xc7}, {&(0x7f00000006c0)=""/222, 0xde}, {&(0x7f00000007c0)=""/142, 0x8e}, {&(0x7f0000000880)=""/82, 0x52}], 0x4, &(0x7f0000000940)=""/209, 0xd1}}, {{&(0x7f0000000a40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b00)=""/49, 0x31}, 0x1}, {{&(0x7f0000000b40)=@hci, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)=""/249, 0xf9}, {&(0x7f0000000cc0)=""/215, 0xd7}, {&(0x7f0000000dc0)=""/56, 0x38}, {&(0x7f0000000e00)=""/7, 0x7}, {&(0x7f0000000e40)}, {&(0x7f0000000e80)=""/161, 0xa1}], 0x6}}, {{&(0x7f0000000fc0)=@xdp, 0x80, &(0x7f0000001580)=[{&(0x7f00000023c0)=""/145, 0x91}, {&(0x7f0000001100)=""/97, 0x61}, {&(0x7f0000001180)=""/255, 0xff}, {&(0x7f0000001280)=""/131, 0x83}, {&(0x7f0000001340)=""/99, 0x63}, {&(0x7f00000013c0)=""/147, 0x93}, {&(0x7f0000001480)=""/200, 0xc8}], 0x7, &(0x7f0000001600)=""/200, 0xc8}, 0x9}], 0x4, 0x40000001, &(0x7f0000001800)={0x0, 0x1c9c380}) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r20, &(0x7f0000000000)=ANY=[], 0xffb4) r21 = socket$netlink(0x10, 0x3, 0x0) r22 = socket$netlink(0x10, 0x3, 0x0) r23 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r23, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r23, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r22, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r24, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r21, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r24}]}, 0x174}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r20, 0x8933, &(0x7f0000001840)={'team0\x00', r24}) r26 = socket$netlink(0x10, 0x3, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r27, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r29, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r26, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r29}]}, 0x174}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001880)={0x0, @loopback, @broadcast}, &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a80)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000001b80)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r6, &(0x7f0000002080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002040)={&(0x7f0000001bc0)={0x474, r7, 0x810, 0x70bd27, 0x25dfdbff, {}, [{{0x8}, {0x1f0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xf519, 0x2, 0x9, 0x1ff4e387}, {0x2, 0x0, 0x3, 0x50}, {0x800, 0x7, 0x79, 0x2}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r19}, {0x104, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x34d3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x7, 0x0, 0x1, 0xe4}, {0x7, 0x5, 0x80, 0x10000}, {0x9, 0x1f, 0x50, 0x2}]}}}]}}, {{0x8, 0x1, r25}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffff7}}, {0x8}}}]}}, {{0x8, 0x1, r29}, {0x80, 0x2, [{0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x7fff, 0x7f, 0x0, 0x4}, {0x72f9, 0x6, 0x5, 0x6}, {0x1000, 0x3b, 0xf1, 0x88e}, {0x2, 0x0, 0x40, 0x4}, {0x6, 0x5, 0x20, 0x101}, {0x3f, 0x4, 0x4, 0x3}, {0x3, 0xf9, 0x40, 0x1}, {0x101, 0xf2, 0x2, 0xffff8000}, {0x3f, 0x4, 0x7, 0xa20}]}}}]}}, {{0x8, 0x1, r30}, {0x80, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}]}}]}, 0x474}, 0x1, 0x0, 0x0, 0x40}, 0x4) socket$netlink(0x10, 0x3, 0x0) r32 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r32, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:04 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:04 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) recvfrom$netrom(r3, &(0x7f0000000140)=""/28, 0x1c, 0x10000, &(0x7f0000000540)={{0x3, @null, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 669.902097] sp1: Synchronizing with TNC 15:56:05 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r5 = socket$netlink(0x10, 0x3, 0xc) writev(r5, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r4, 0x0, r5, 0x0, 0x422000a7b, 0x0) write$input_event(r4, &(0x7f0000000140)={{0x0, 0x7530}, 0x1, 0xf87, 0x2}, 0x18) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r7, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x1, 0x0) ioctl$TIOCL_SELLOADLUT(r9, 0x541c, &(0x7f0000000540)={0x5, 0x8001, 0x1c7, 0x9c, 0x3}) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) prctl$PR_SET_UNALIGN(0x6, 0xaabd1d15e15994c6) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r13, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r13}]}, 0x174}}, 0x0) [ 670.618263] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 675.722680] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:11 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 676.002986] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 676.155020] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0xfffffffffffffd7b, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) sendto(r0, &(0x7f0000000100)="16", 0x1, 0x0, 0x0, 0x0) 15:56:11 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x202, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000540)={@in={{0x2, 0x4e22, @remote}}, 0x0, 0xff, 0x0, "1765da2254e19051f022a935ba10fe9efe15073eb0b7ab139af8951ce50e2d59502a865a3b7c82b46718b9918e308be60e3925377173cf35040634bdeb1808af62b049b205cd3e467606b580007b0d51"}, 0xd8) r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x2000, 0x0) setsockopt$inet_int(r11, 0x0, 0x5, &(0x7f0000000640)=0x3, 0x4) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x160, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x138, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x128, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x160}}, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r13, 0x40505330, &(0x7f0000000040)) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) fcntl$lock(r13, 0x7, &(0x7f0000000680)={0x1, 0x0, 0x4, 0x1, r14}) 15:56:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$KVM_SET_TSC_KHZ(r12, 0xaea2, 0x6) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:56:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xffb4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x1000, 0x1f, 0x1, 0xffffa7f1, 0x5, 0x1, 0x3, 0xee, r3}, &(0x7f0000000100)=0x20) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:11 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 676.692285] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0xc) writev(r3, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r2, 0x0, r3, 0x0, 0x422000a7b, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x517f40, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@file={0x83374a54db11b3e0, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000280)="bb795fb169df3ee5a16d799716fbb29957b7dacdf3b0005fdd2a796d409250b65c8e5b5dec6d8ba34da4c271515ecbbb8b8a81790f88fc67b4231c4e1a8d09fbe0bdc290d1da43c99d23de79c9b2", 0x4e}, {&(0x7f00000003c0)="02dbe7547fea9c883a05767ba134ac80c38ac3dedd5b0b6028a1096b19befb01e2201239600121b018a9c0284e3771a8e1d1fe760720ded829a61d2e7b07122865fc5a3afc74df224e808a7065c22145aaa71d390d1e7e358f25253d5ed5290645a44b55d2bfab3774dff6d8313feb05ebc30b5a29b60c2936052e651a5410a192ae2ba29f53848da428e7505e8ac4c17e2aa6504160981255cf7aa3d8f004f43e89", 0xa2}], 0x2, 0x0, 0x0, 0x10}, 0xd9fb45c3320ce1f1) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r7 = socket$netlink(0x10, 0x3, 0xc) writev(r7, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r6, 0x0, r7, 0x0, 0x422000a7b, 0x0) recvfrom$unix(r6, &(0x7f0000000040)=""/44, 0x2c, 0x40000000, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) pipe(0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x804101, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) socket$isdn_base(0x22, 0x3, 0x0) syz_kvm_setup_cpu$x86(r0, r9, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:12 executing program 1: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) listen(r0, 0x0) 15:56:12 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) socket$inet6(0xa, 0x3, 0x90) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 677.858199] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 677.870209] sp1: Synchronizing with TNC [ 677.961165] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:56:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="7401000010001fff00000000ecfe0c24bd6fe600fdccd7be4eb2ab01c0ea394f25e039674299401c00634344488eb116bcfe6516bcfc08e56244cf6ed94cbac16714e3abbadfc463", @ANYRES32=0x0, @ANYBLOB="00000000000000004c0112000c000100697036746e6c00003c0102000800080005000000080011004e240000080011004e20000004001300080007000300008014000300ff0200000000000000000000000000011400030043739fee2404ff42b120dede2d7dbfda08000900040000000800090004000000080009000400000014000300ff010000000000000000000000000001080007000400000008000900040000000800060008000000080008001c000000080008000f0000000400130008000500ed0000000800140087f1000014000200fe8000000000000000000000000000110800070009000000080008002700000014000300fe8000000000000000000000000000aa080007000700000008000800330000000800070002000000080006000900000014000200fe8000000000000000000000000000bb08000700010000000800070004000000080008002d00000008000a00", @ANYRES32=r10], 0x174}}, 0x0) [ 678.361267] sp1: Synchronizing with TNC 15:56:13 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) socket$inet6(0xa, 0x3, 0x90) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:13 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000440)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}}, 0x5c) [ 679.066692] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 679.684540] netlink: 340 bytes leftover after parsing attributes in process `syz-executor.4'. [ 679.766090] netlink: 340 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:15 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) socket$inet6(0xa, 0x3, 0x90) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000000)=0x2, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="b5", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 680.131222] sp1: Synchronizing with TNC 15:56:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000179600008000100", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r11, &(0x7f0000000000)=ANY=[], 0xffb4) r12 = accept(r11, &(0x7f0000000540)=@ethernet={0x0, @link_local}, &(0x7f0000000140)=0x80) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r12, 0x8982, &(0x7f00000005c0)={0x3, 'ip6gre0\x00', {0x10000}, 0xed35}) 15:56:15 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 680.604388] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:15 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:15 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r10 = socket$netlink(0x10, 0x3, 0xc) writev(r10, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r9, 0x0, r10, 0x0, 0x422000a7b, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r11, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r11, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r12, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r13}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r17, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r14, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r17}]}, 0x174}}, 0x0) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) r20 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r21 = dup2(r19, r20) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) recvmsg$kcm(r21, &(0x7f0000002640)={&(0x7f0000000040)=@can={0x1d, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000140)}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000002bc0)=""/249, 0xf9}], 0x6, &(0x7f0000002540)=""/239, 0xef}, 0x2061) ioctl$sock_inet6_SIOCADDRT(r18, 0x890b, &(0x7f0000002680)={@empty, @mcast2, @mcast2, 0x4, 0x8, 0x20, 0x100, 0x9, 0x841803c7, r22}) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000540)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r9, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000020}, 0xc, &(0x7f0000000640)={&(0x7f0000000740)={0x2dc, r12, 0x8, 0x70bd2a, 0x25dfdbff, {}, [{{0x8, 0x1, r17}, {0xb0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x5d53e3cf2b1fc18d}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0xec, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x101, 0x9, 0xe1, 0x6}, {0x80, 0x3b, 0xdf, 0xffff}, {0x5, 0x27, 0xff, 0x1}, {0x7, 0x7, 0x0, 0x72}, {0x9, 0x0, 0xff, 0x1}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r23}, {0x114, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x1000, 0x1, 0x44, 0x7}, {0x1, 0x57, 0x14, 0x401}, {0x769a, 0x1, 0x1f}, {0x9, 0x0, 0xf4, 0x4}, {0x6, 0x43, 0x4, 0xffffffff}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x56}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}]}}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x8080}, 0x804c) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r25, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r25}]}, 0x174}}, 0x0) 15:56:16 executing program 1: [ 681.249962] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 681.259041] sp1: Synchronizing with TNC 15:56:16 executing program 1: 15:56:16 executing program 1: 15:56:16 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 681.805978] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:17 executing program 1: 15:56:17 executing program 1: [ 683.453032] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:18 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x10, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000500)={0x101, 0x9, 0x0, 0x1ff, 0x5, [{0xffffffff, 0x7f, 0x3ff, 0x0, 0x0, 0x2000}, {0x3, 0x90, 0x4000000000, 0x0, 0x0, 0x1105}, {0x8, 0x7fff, 0x9, 0x0, 0x0, 0x2}, {0x7, 0x6c, 0x6, 0x0, 0x0, 0x3100}, {0x7fff, 0x58, 0x8001, 0x0, 0x0, 0x2f01}]}) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x8060, 0x0) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xc000000}}], 0x4000000000000d0, 0x0) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="30010000"], 0x1}, 0x1, 0x0, 0x0, 0x80000}, 0x0) recvfrom$rxrpc(r3, &(0x7f00000000c0)=""/79, 0x4f, 0x40002042, &(0x7f0000000140)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e21, 0x966a, @loopback, 0xffff0001}}, 0x24) write$selinux_validatetrans(0xffffffffffffffff, &(0x7f0000000440)={'system_u:object_r:getty_var_run_t:s0', 0x20, 'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 0x8000, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x8a) 15:56:18 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000100000008000100ea28ac53edc1bcddc8aadc11cd3055e8fda1347d68200251acc2b8d79bc6c9275ba6f691146a5f2d6933b230244649", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r10, 0x40e, &(0x7f0000000240)=0x3) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:56:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r6 = socket$netlink(0x10, 0x3, 0xc) writev(r6, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r5, 0x0, r6, 0x0, 0x422000a7b, 0x0) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6b) [ 683.819320] audit: type=1400 audit(1576166178.833:91): avc: denied { name_bind } for pid=3304 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 684.075285] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 684.226334] audit: type=1400 audit(1576166178.883:92): avc: denied { node_bind } for pid=3304 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 684.446557] sp1: Synchronizing with TNC 15:56:19 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 684.475185] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:19 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 685.203834] sp2: Synchronizing with TNC [ 685.211106] sp1: Synchronizing with TNC 15:56:20 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e8, &(0x7f00000005c0)="3abb2ed526ffe6a0411f678c5471ec23174d522d29f68bdde52affb0d37f70dbedf5dc442c4f75fc057c290bc9146b1045e2e5043802b5b95cca740d2f886b5a4b5a9bf126ae6f4dace448e9cc0e225d479271fde017dbd217c356598cd412d659788c491b040fa68f8460e069f588cd4a") ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000640), &(0x7f0000000680)=0x8) r4 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x4, 0x240100) write$UHID_GET_REPORT_REPLY(r4, &(0x7f0000000240)={0xa, 0x2, 0x0, 0x1}, 0xa) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r7, @ANYBLOB="3c00020038000100240001006d636173745f76fd4c4d5db8212ef472016a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000009d1152e42e683732", @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) fcntl$setpipe(r5, 0x407, 0xffffffffffffff6d) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000a40)=@newlink={0x18c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x164, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x154, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="a83b35f55bb2fe7b2488fc920eb6764b"}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x109}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x20}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="25dc8a42419c65448ffb7a4e752f778d"}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x18c}, 0x1, 0x0, 0x0, 0x300080c1}, 0x0) bind$rose(r4, &(0x7f0000000500)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0x1c) 15:56:20 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140)={0x2f6d, 0xcfa, 0x1, 0x1ff}, 0x10) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xc) writev(r4, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r3, 0x0, r4, 0x0, 0x422000a7b, 0x0) r5 = accept(r4, &(0x7f00000005c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, &(0x7f0000000640)=0x80) ioctl$SIOCAX25GETINFO(r5, 0x89ed, &(0x7f0000000740)) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000000100)={'\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r7, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r8, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r9}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r6, 0x800442d4, &(0x7f0000000240)=0xf) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r13, &(0x7f0000000000)=ANY=[], 0xffb4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r14) ioctl$sock_FIOGETOWN(r14, 0x8903, &(0x7f0000000540)=0x0) write$P9_RGETLOCK(r13, &(0x7f0000000580)={0x27, 0x37, 0x1, {0x2, 0x5, 0xc17, r15, 0x9, '\\$[+%*/^\x00'}}, 0x27) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r16, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r16}]}, 0x174}}, 0x0) 15:56:20 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r0 = socket$inet6(0xa, 0x3, 0x90) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 686.598009] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 686.710893] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:22 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r0 = socket$inet6(0xa, 0x3, 0x90) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x0, 0x3f) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:22 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[], 0xffb4) sendto$inet6(r7, &(0x7f0000000540)="0f4629d6e6fa509059ac053ffaaaf41cdd7be7f12851d88eb16e7ad403f1637076bf18f0fde508eb0c4eee45e607c51b6a8ab28c5793561b8f1e77580098b74f8366cbac20861861b8b8b4af00c118c907519e3b57da33485adfbcb52f", 0x5d, 0x30, &(0x7f0000000140)={0xa, 0x4e21, 0x3, @rand_addr="bf45a80b3486f350893c17920111e3a4", 0x80000000}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:56:22 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r11, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c000000100085060000000000ffff0000000000", @ANYRESHEX=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:56:22 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r0 = socket$inet6(0xa, 0x3, 0x90) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 687.361137] sp1: Synchronizing with TNC 15:56:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000040)) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xffb4) accept4$packet(r2, &(0x7f0000000140), &(0x7f0000000340)=0x14, 0x100000) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xffb4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup2(r7, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r11, 0x80045700, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r4, 0x6, 0x11, &(0x7f00000000c0)=""/13, &(0x7f0000000100)=0xd) recvmsg$kcm(r9, &(0x7f0000002640)={&(0x7f0000000040)=@can={0x1d, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000140)}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000002bc0)=""/249, 0xf9}], 0x6, &(0x7f0000002540)=""/239, 0xef}, 0x2061) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000002680)={@empty, @mcast2, @mcast2, 0x4, 0x8, 0x20, 0x100, 0x9, 0x841803c7, r12}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'nr0\x00', r12}) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r14 = socket$netlink(0x10, 0x3, 0xc) writev(r14, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r13, 0x0, r14, 0x0, 0x422000a7b, 0x0) sendmsg$nl_route(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@ipv4_getrule={0x20, 0x22, 0x328, 0x70bd2b, 0x25dfdbbe, {0x2, 0x80, 0x0, 0x7e, 0xeb, 0x0, 0x0, 0x9af6e7887fd8fffe, 0x2bc425754c0bea8e}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0xa3b4421f4d54a428) name_to_handle_at(r5, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0xa8, 0x11, "de0a93d0a05961380a64f7936ee8dc5b96a3a46e01b8d665c875d914272ed60f4ccb99f3e9d666519113a024c4db2b5bcef71c2ca28f27e8f4311bfde46303ec50bd57ee2bacadcd54bb0f9d1c95afde94991fdd19e3d599e615ed4d9b82ebf89820a9cdc8d6936cf5b3e1b7956f0194c22cbea7c6053056035c345fbb4faf943559b9086526f211cb392dab678ab95f08b7facfe31a80233978d378b966e197"}, &(0x7f0000000500), 0x400) [ 687.604529] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 687.931970] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:23 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 688.051168] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 688.090497] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 688.158249] sp1: Synchronizing with TNC 15:56:23 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:23 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7401000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r10], 0x174}}, 0x0) 15:56:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf08c0800, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800093ac3804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 15:56:23 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x8}, 0x8) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 688.731338] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 688.764844] EXT4-fs (loop1): inodes count not valid: 2895315072 vs 128 15:56:23 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r8 = socket$netlink(0x10, 0x3, 0xc) writev(r8, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r7, 0x0, r8, 0x0, 0x422000a7b, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r12 = socket$netlink(0x10, 0x3, 0xc) writev(r12, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r11, 0x0, r12, 0x0, 0x422000a7b, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r10, 0xc00c642e, &(0x7f0000000140)={0x0, 0xc0000, r11}) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r14, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$DRM_IOCTL_GEM_OPEN(r14, 0xc010640b, &(0x7f0000000240)={0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_GEM_FLINK(r7, 0xc008640a, &(0x7f0000000500)={r13, r15}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[]}}, 0x0) sendmsg$nl_route(r16, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x74, 0x10, 0xffffff1f, 0x10000, 0x0, {}, [@IFLA_LINKINFO={0x2bb, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x3c, 0x2, [@IFLA_BR_MCAST_SNOOPING={0x8, 0x17, 0x6}, @IFLA_BR_MCAST_LAST_MEMBER_INTVL={0x8, 0x1e, 0x761}, @IFLA_BR_MCAST_STARTUP_QUERY_CNT={0x8, 0x1d, 0x7fff}, @IFLA_BR_MCAST_QUERY_RESPONSE_INTVL={0x8, 0x22, 0x4}, @IFLA_BR_MCAST_IGMP_VERSION={0xab, 0x2b, 0x8}, @IFLA_BR_FORWARD_DELAY={0x8, 0x1, 0xf}, @IFLA_BR_MCAST_QUERY_USE_IFADDR={0x8, 0x18, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r19}]}, 0x74}}, 0x0) [ 688.989601] EXT4-fs (loop1): inodes count not valid: 2895315072 vs 128 15:56:24 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000900)="e08ad7330b792d0a098707b72b56ef8f31652382187b520e5518684a30e7518b449462546420406e7105b513e4a00b3080afe9995c3cece68d9f091929fe955f4d688083411a6d36f48cb9cc6027e182b79c96f5b25c6ecc020ef86f5a8a00390aee41232eb4e5017af2dc9695447f50347446b0f3cb027cd35906db075099449afa5fbb0839abca7a42c9800575d1c8d76bec2b72383428bd4d5c", 0x9b) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x14, r12, 0xc4c2c822e4e11799, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x108, r12, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x69f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4f547d18}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x429f}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffff27}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xda2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x404c080}, 0x40008) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="7401000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r10], 0x174}}, 0x0) 15:56:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x80000, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r1, 0x40184152, &(0x7f0000000400)={0x0, &(0x7f00000003c0)=[&(0x7f0000000140)="3b7b9fc68d7b578d9767fccd140f177b19fb1095f2728d54bdf117631ec355c2730a40507d246511134efba8d10b65a6c66c7846790eceb695", &(0x7f0000000180)="d9c3ecabd21ed901259eb1e3c6ddeb6e1ee27f9f4ea56198f4e883f1563bf138563e21153a33ce5da090f5374388187be1fe53367fb111c3a747d02ccec004536704d613f71c1675d3331a41d2ec4c483a949fd408e174b500c18c5bc2f144f2ef72548aecaf38c3b35465fb71810b6b3cffaf858757abe72fcebeb056bbedca92867600513e4138c031b4d1bec6ed3e57dafcdc55e67b19e9e7b41db71b3d7a14a8c261060c4dac693fba0575f00e334474fec542d3cc0e9eca1dea95e322cccfa2b1e4ba6cb64c43213951c6ccedf1adaac2f785ab0755de9462142172e4387f6a1060bbab7afb361a10626c25d4", &(0x7f0000000280)="e5924996e07dd990dde9a01260b2ff5caadb428325ef51d48d434645bcd573046b179383d537a1432cd28920443d03f0ce2e3d7a72a490957b10ee9b75ca1ab55ae246840793acd1660295326828d41af9", &(0x7f0000000340)="e5f68d2008a6b5b5561106a687c95b832f1bd787b5155c6b9ae1af9940043467caffa114323e2b8e1997f21f717cf4bab2afaf0e203720984d3a7e57fa17bf033a27a7a71f9dc3eaf3f6ab44e36c383cefa73891e36cbd42498294c4b7610fff1109d711ccff535a4fef516b19c10909"], 0x10000}) ioctl$TCGETS(r0, 0x4b4c, &(0x7f0000000080)) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000040)=0x0) write$cgroup_pid(r2, &(0x7f00000000c0)=r4, 0x12) [ 689.301024] sp1: Synchronizing with TNC [ 689.305169] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 689.419120] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'. [ 689.459110] Unknown ioctl 1075331410 15:56:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000040)) fcntl$addseals(r2, 0x409, 0x3) fcntl$getownex(r0, 0x10, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getuid() pipe(&(0x7f0000000380)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xc) writev(r4, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r3, 0x0, r4, 0x0, 0x422000a7b, 0x0) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000280)=0x0) syz_mount_image$msdos(&(0x7f00000000c0)='msT.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@dots='dots'}, {@fat=@dos1xfloppy='dos1xfloppy'}, {@nodots='nodots'}], [{@uid_lt={'uid<', r5}}, {@uid_lt={'uid<', r5}}, {@smackfsdef={'smackfsdef', 0x3d, 'vmnet1+@}$md5sumppp0vmnet1\\selfsystem,'}}]}) syz_read_part_table(0x5, 0x3, &(0x7f0000000180)=[{&(0x7f0000000000)="96d09ef736390ad9f75cacc9b8a47c3f638e4140579dff83db1b9af3fe45ec6a63a645b9a40f73d7fd1d9a18fe2dd221912d5a26e0074b85d19d4b2675b4797285d0a072d18c9063", 0x48, 0x38000000000000}, {&(0x7f0000000080)="fd05044e3ea792324962b3f8d1c43985ed584d1a6ce72a4e1065171dea390106fe938e", 0x23, 0x3f}, {&(0x7f0000000140)="e37a5090da3a3339c0c02863b75e045bd79d", 0x12, 0x5ff}]) [ 689.632175] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:24 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x0, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:24 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x5) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') sendto(r3, &(0x7f0000000540)="1d2dfbfb09bc2dfcd74bf469212dd7fba6e06c768143e369ee2af5bc65d0d701313385b88fe609e749e96c8390346828163eed23a257c510cdc2e739f9a8e51983b513c6b1f9a57352f1f9ba304871afc80834a661c1427eb4300be6ff0dd9b89c0d0a43ee23c1fe90ab28b4f25d17c7e7106503a713d65e3e8c3b50ad3194b538584bc0925bc84861913a", 0x8b, 0x80, &(0x7f0000000600)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null]}, 0x80) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x20c900) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:56:25 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x0, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:25 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioprio_get$uid(0x6, 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5800e500", @ANYRES16=r5, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7401000010001fff000800"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r10], 0x174}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r12, 0x84, 0x21, &(0x7f0000000140)=0x401, 0x4) [ 690.667814] sp1: Synchronizing with TNC 15:56:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000240)={0x101, 0xfc2, 0x6, 0x100}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r11 = accept4$alg(r10, 0x0, 0x0, 0x80800) r12 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x8ce1c812f35dacf, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000540)={r11, r12}) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r13, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x1fc, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1d4, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c4, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x2bd, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2a}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @ipv4={[], [], @rand_addr=0x40}}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @remote}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @loopback}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x20}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @ipv4={[], [], @broadcast}}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0xfffffffffffffe5e}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r13}]}, 0x1fc}}, 0x0) 15:56:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) chdir(&(0x7f0000000100)='./bus\x00') sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x1, 0x1, 0x0, 0x3, 0x200000000, 0x0, 0xfffffffffffffffd}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2601], 0xa30) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r1, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0xfffffd89}], 0x1}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) setxattr$security_smack_transmute(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='sK64TRA\x00', &(0x7f0000000040)='TRUE', 0x4, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 15:56:25 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x0, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:26 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:26 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x400000, 0x0) write$FUSE_DIRENT(r7, &(0x7f0000000540)={0x160, 0x0, 0x2, [{0x2, 0x200, 0x3, 0xfffffffe, 'syz'}, {0x6, 0x6f3, 0xb, 0x7, 'selinuxppp0'}, {0x2, 0xeac, 0x13, 0x7fff, 'mcast_rejoin_count\x00'}, {0x2, 0x7, 0x11, 0xffffffff, '/dev/dlm-monitor\x00'}, {0x3, 0x1, 0x0, 0x6}, {0x2, 0x1, 0xd, 0xea, '/dev/snd/seq\x00'}, {0x6, 0x0, 0xc, 0x8001, '/dev/ashmem\x00'}, {0x4, 0x89, 0x7, 0x9, 'ip6tnl\x00'}, {0x6, 0x8, 0x5, 0x9, 'proc-'}]}, 0x160) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:56:26 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000040)) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000580)={r1, 0x31e, 0xc5}, &(0x7f0000000540)=ANY=[@ANYRESDEC=r3], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f2311646cf0c462ef04f2831f4c750f62fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95") r4 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r4, 0xab2ee000) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r7, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000140), 0x4) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r13, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$TIOCSLCKTRMIOS(r13, 0x5457, &(0x7f0000000240)) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000002ac76406c27a0a3955b78df52a49368e", @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) 15:56:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xffff, 0x1, 0x20, 0x9, "1c2becfe80649a9ae244e9867c5a6c5a1bd59a45c34547f1e4471476a1733447b0e8ad0e6122c63f0a21c4655bbf1daa276fcc303732da3ff4dd82b078eab01f", "4f0f07fcc053bb33823f481f58c990762ed754321752cd2f463e77b6382a9a63", [0x5, 0x9]}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000140)={0x2, 0x4, 0xffff, 0x8, 0x3f, 0x40400}) accept$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) r4 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x180000) recvmmsg(r4, &(0x7f0000000440)=[{{&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x0, &(0x7f0000000300)=[{&(0x7f0000000480)=""/258}], 0xfffffffffffff09, &(0x7f0000000340)=""/196, 0x377}, 0xfffffff8}], 0x2, 0x0, &(0x7f0000009800)={r0, r1+10000000}) exit(0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) [ 691.825552] nla_parse: 9 callbacks suppressed [ 691.825559] netlink: 392 bytes leftover after parsing attributes in process `syz-executor.4'. [ 691.839941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 691.866863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=50986 sclass=netlink_route_socket pig=3598 comm=syz-executor.5 [ 691.984649] sp1: Synchronizing with TNC 15:56:27 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 692.427308] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=50986 sclass=netlink_route_socket pig=3598 comm=syz-executor.5 [ 692.559637] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 692.659640] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 692.739507] sp1: Synchronizing with TNC 15:56:27 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) write$P9_RLINK(r3, &(0x7f0000000140)={0x7, 0x47, 0x2}, 0x7) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:56:27 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000540)=ANY=[@ANYBLOB="656e633d72610e339ffb73683d67686173682d63650000000000000000000000000000000000004f2f1a21f042a855205a000000000000050000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b000000000000000000000000f6c2d3be00"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xfffffdf1, &(0x7f0000000080)={&(0x7f0000000140)={0x58, r5, 0x1, 0xffffffff, 0x0, {}, [{{0x32b, 0x1, r6}, {0x3c}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) exit_group(0x3) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:56:27 executing program 1: open(0x0, 0x214327, 0x0) r0 = open$dir(0x0, 0x22ce41, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'vlan0\x00'}) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b34, &(0x7f00000001c0)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x00\x00@\x00\x00\x00\x00\x00(\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02\xffa\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyg-\x97\xa1\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99') ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fanotify_mark(r6, 0x76, 0x80000002, r1, &(0x7f0000000080)='./bus\x00') inotify_add_watch(r4, &(0x7f0000000000)='./bus\x00', 0x18) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_open_procfs(r7, 0x0) r8 = syz_open_dev$audion(0x0, 0x1, 0x0) accept4$packet(r8, 0x0, &(0x7f0000000380), 0x0) pipe(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r10, 0x40485404, &(0x7f0000000140)={{0x1, 0x2, 0x8000, 0x76fa82e90795a177, 0x8}, 0x4, 0x2}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r11 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x9, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_inet6_SIOCADDRT(r11, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f666d6c653020766274683170726f63207b2373798217e36773797374656d212520736c616e31207d5d20205c759188726d643573676d70707031bbd305ba0a4050fb43555e75b01fd98d1cef5b0d77709098486aaf651a3953bd61109eb8"], 0x63) 15:56:27 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 693.091432] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 693.154087] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x400c2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$netlink(0x10, 0x3, 0xc) writev(r5, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r3, 0x0, r5, 0x0, 0x422000a7b, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r6, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000003c0)={0x0, 0xfb, 0x1015, 0x4, 0x7, "d8626d619a9b4a7f312c5327cf14d3a2", "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"}, 0x1015, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x6, &(0x7f0000000040)=""/230, &(0x7f0000000140)=0xe6) r7 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r8, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) r9 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r9) r10 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r10, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r9, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b2b25fe8000000000000005baa68754ba00e8c1344f3e62d76c27e800004102ffffff88c0", 0x430}], 0x1}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f00000001c0)) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000001540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001500)={&(0x7f0000001400)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r11, @ANYBLOB="ec9c28bd7000fddbdf25090000002c0009000800020055de00000800020006000000080001000700000008000200ffffffff08000200ee000000600007000c0003007588181e000000000c0003000104000000000000080001003d020000080002000000e01f08000100060000000c000300080000000000000008000100c10000000c0004002aad0000000000000c00040009000000000000001800020008000200000000000400040008000122010000000c00020008000100120800000c0009000800020002000000"], 0xd0}, 0x1, 0x0, 0x0, 0x4054050}, 0x8005) 15:56:28 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x4000, 0x40, &(0x7f0000000580)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='tLam\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x111000) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r11, 0x40505330, &(0x7f0000000040)) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYRES64=r11], 0x3}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 693.764884] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:28 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:28 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], 0x0) 15:56:29 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x134, 0x10, 0xffffff1f, 0xfffffffe, 0x0, {}, [@IFLA_LINKINFO={0x10c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xfc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x20004}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x134}}, 0x0) [ 694.048251] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:29 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SUBDIVIDE(r1, 0xc0045009, &(0x7f0000000040)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(r2) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() perf_event_open(&(0x7f000001d000)={0x5, 0xffffffffffffff30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x510c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9f}, 0x10000, 0x0, 0x2}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) close(0xffffffffffffffff) r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x0) sendfile(0xffffffffffffffff, r6, 0x0, 0x800000000024) getsockopt$inet6_mreq(r6, 0x29, 0x1d, &(0x7f0000000380)={@mcast1}, &(0x7f0000000280)=0x14) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000002800)=ANY=[], 0x0) r7 = dup(r5) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000140)=0x0) prlimit64(r9, 0x6, 0x0, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r7, 0x402c5342, &(0x7f00000004c0)={0x100000000000, 0x40000009, 0x9, {0x0, 0x989680}, 0x40, 0x7}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r7, 0x402c5342, &(0x7f0000000540)={0x9, 0xca0, 0x0, {0x0, 0x989680}, 0x8, 0x7}) r11 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) readv(r11, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x2}], 0x200000000000000f) sendmsg$nl_generic(r10, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xd}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5b3f6fb72200001100e2ab0000"], 0x1c}}, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x830deab2bafca507, 0x0) 15:56:29 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 694.523733] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:29 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:30 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0x5b, 0x31}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f0000000740)="ac51b47d5f66f271adef8b88dcb660d2185fdec1404edc8b335bf366ae904bded9f6f6ad75a6bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea671978037cbc06570582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49a70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000800)="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") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r4, 0x40505330, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r4, 0xc04c5349, &(0x7f0000000540)={0x5, 0x5, 0x4d7}) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:56:30 executing program 1: open(0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'vlan0\x00'}) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b34, &(0x7f00000001c0)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x00\x00@\x00\x00\x00\x00\x00(\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02\xffa\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyg-\x97\xa1\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99') ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0x1, 0x0) accept4$packet(r1, 0x0, &(0x7f0000000380), 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xc) writev(r4, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r3, 0x0, r4, 0x0, 0x422000a7b, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000000)=""/49) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f666d6c653020766274683170726f63207b2373798217e34773798a74656d212520776c616e31207d5d20205c75917d726d643573676d70707031bbd30502004050fb43555e75b01fd98d1cef5b0d77709098486aaf651a3953bd61109eb803310da3f7689633ecfbc6b313512d4f20ee346481dfc746376dfaa4bbcb"], 0x63) 15:56:30 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f0000000140)) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r11, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r12}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000600)={0x13, 0x24, 0xfa00, {&(0x7f0000000940), r12}}, 0xe54e37e167fd7164) r13 = socket(0x10, 0x803, 0x0) setsockopt$inet_int(r13, 0x0, 0x21, &(0x7f0000000240)=0x6, 0x4) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="008bee27c061720defda5a8057c4b677bfcbd27067f8d9861aee88e9db3177e468e627008283be2eba8df75ef35efe32446e70eed1cbc3c7a486940950", @ANYRES32=r14, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@ipv4_deladdr={0x2c, 0x15, 0x1, 0x70bd2d, 0x25dfdbfb, {0x2, 0x10, 0x4, 0x83, r14}, [@IFA_LABEL={0x14, 0x3, 'veth1_to_team\x00'}]}, 0x2c}}, 0x0) 15:56:30 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000140)={0x0, @frame_sync}) ioctl$VIDIOC_DECODER_CMD(r3, 0xc0485660, &(0x7f00000000c0)={0x0, 0x1, @raw_data=[0x401, 0x3, 0x200, 0x401, 0x8, 0xffffffe0, 0x6, 0x7, 0x2, 0x6, 0x3f, 0x3, 0x100, 0x65f3, 0x5, 0x3ff]}) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 695.464221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25024 sclass=netlink_route_socket pig=3702 comm=syz-executor.5 [ 695.663855] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:31 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 696.060711] sp1: Synchronizing with TNC [ 696.112081] ucma_write: process 2971 (syz-executor.5) changed security contexts after opening file descriptor, this is not allowed. 15:56:31 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000140), &(0x7f0000000240)=0x4) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) r2 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r2, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000580)={0x2}) r4 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r4, 0xab2ee000) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r7, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) [ 696.482224] sp2: Synchronizing with TNC 15:56:31 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:31 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000240)=0x5f77f4ca, 0x4) r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:56:32 executing program 1: open(0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'vlan0\x00'}) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b34, &(0x7f00000001c0)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x00\x00@\x00\x00\x00\x00\x00(\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02\xffa\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyg-\x97\xa1\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99') ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0x1, 0x0) accept4$packet(r1, 0x0, &(0x7f0000000380), 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xc) writev(r4, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r3, 0x0, r4, 0x0, 0x422000a7b, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000000)=""/49) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f666d6c653020766274683170726f63207b2373798217e34773798a74656d212520776c616e31207d5d20205c75917d726d643573676d70707031bbd30502004050fb43555e75b01fd98d1cef5b0d77709098486aaf651a3953bd61109eb803310da3f7689633ecfbc6b313512d4f20ee346481dfc746376dfaa4bbcb"], 0x63) [ 697.452822] nla_parse: 3 callbacks suppressed [ 697.452836] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 698.881279] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:34 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x0, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 699.135939] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:34 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001002d636173745f72656a6f696e5f636f756e740000000000000000000000c0000008000300030000000f0204000000000043f91b8773b26ac752d7b3f09d48baa4b50612aa55278545b8531dac2767cf3f4240b9797cf403d48849e4241abc69fe537d10efbeab68810adaecf6fb2a7dd420107ec9cc3a670dda824f83c258828897cdb12755433f51e9e36532378c276348ac3dd78323dc1a6ec8fb66493d695c73865c7762c1a0eb458b97ade18ab0e1094e917d63819cde1d340f3b9cfc90eb1915902ebab7e0d4ba734abc45ecd05d70a8590435895e9e8c2856e707783c1b8c121c021870a7158c4d566167565cf772eaf0c370"], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x113, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x130, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x120, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x7}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x158}}, 0x0) 15:56:34 executing program 1: open(0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'vlan0\x00'}) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b34, &(0x7f00000001c0)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x00\x00@\x00\x00\x00\x00\x00(\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02\xffa\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyg-\x97\xa1\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99') ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0x1, 0x0) accept4$packet(r1, 0x0, &(0x7f0000000380), 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xc) writev(r4, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r3, 0x0, r4, 0x0, 0x422000a7b, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000000)=""/49) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f666d6c653020766274683170726f63207b2373798217e34773798a74656d212520776c616e31207d5d20205c75917d726d643573676d70707031bbd30502004050fb43555e75b01fd98d1cef5b0d77709098486aaf651a3953bd61109eb803310da3f7689633ecfbc6b313512d4f20ee346481dfc746376dfaa4bbcb"], 0x63) 15:56:34 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='\x00\x00\x00\x11[\xe9\"\x9e!\xd8mn', 0xa002, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000500)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0xf031f0b5871fae9a, 0x100000}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x0, 0x12, 0x4e21}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0x327e}, @IFLA_IPTUN_ENCAP_DPORT={0x0, 0x12, 0x4e20}]], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLOWINFO={0x0, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x3ba, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 699.489381] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 700.316120] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.0'. [ 700.572232] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:35 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x0, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 700.628576] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 700.741800] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.0'. [ 700.881151] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.5'. [ 700.950095] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:36 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:56:36 executing program 1: open(0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'vlan0\x00'}) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b34, &(0x7f00000001c0)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x00\x00@\x00\x00\x00\x00\x00(\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02\xffa\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyg-\x97\xa1\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99') ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$audion(0x0, 0x1, 0x0) accept4$packet(r1, 0x0, &(0x7f0000000380), 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xc) writev(r4, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r3, 0x0, r4, 0x0, 0x422000a7b, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000000)=""/49) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f666d6c653020766274683170726f63207b2373798217e34773798a74656d212520776c616e31207d5d20205c75917d726d643573676d70707031bbd30502004050fb43555e75b01fd98d1cef5b0d77709098486aaf651a3953bd61109eb803310da3f7689633ecfbc6b313512d4f20ee346481dfc746376dfaa4bbcb"], 0x63) 15:56:36 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x101000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:56:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000040)={0x8001, 0x0, 0x2, 0x3}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) pipe(0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x200000, 0x0) write$nbd(r5, &(0x7f00000000c0)={0x67446698, 0x0, 0x3, 0x3, 0x3, "27b4d3608c4896248f20ba43610238a47583757cfd5336765597d2391ca8dd0fb2271e20e863447c0295f5aadad08eb781492aad8ebf79bf4dfd12ecfd29cca3bba5ac18d619cf83a94348d59731428ae09604350157db55eb1d63f12b06cd14bbfce41a3e1402e4967eca488d3803a3b881dde5108ed8afedf7d81d14339c189a71ac36ecbbb69a8d22fe87a703dd755963186b124fb6ea6061a278f6450581f7558e9836e104702e1cabd49bcf264c12e9b04ccd338cf0d85803854a148b214e4d4925772b3e7e87292766ce361409ccfe97abe0500025c7c20b88bdfbdefaae4e00df7475afd2dab283"}, 0xfb) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r7, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r16, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r13, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r16}]}, 0x174}}, 0x0) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r20 = dup2(r18, r19) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) recvmsg$kcm(r20, &(0x7f0000002640)={&(0x7f0000000040)=@can={0x1d, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000140)}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000002bc0)=""/249, 0xf9}], 0x6, &(0x7f0000002540)=""/239, 0xef}, 0x2061) ioctl$sock_inet6_SIOCADDRT(r17, 0x890b, &(0x7f0000002680)={@empty, @mcast2, @mcast2, 0x4, 0x8, 0x20, 0x100, 0x9, 0x841803c7, r21}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x684b395f139df950, &(0x7f0000000280)={@loopback, @local, 0x0}, &(0x7f00000002c0)=0xc) r23 = socket$inet6_tcp(0xa, 0x1, 0x0) r24 = socket$inet6_tcp(0xa, 0x1, 0x0) r25 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r26 = dup2(r24, r25) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r27, &(0x7f0000000000)=ANY=[], 0xffb4) recvmsg$kcm(r27, &(0x7f0000002640)={&(0x7f0000000040)=@can={0x1d, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000140)}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000002bc0)=""/249, 0xf9}], 0x6, &(0x7f0000002540)=""/239, 0xef}, 0x12061) ioctl$sock_inet6_SIOCADDRT(r23, 0x890b, &(0x7f0000002680)={@empty, @mcast2, @mcast2, 0x4, 0x8, 0x20, 0x100, 0x9, 0x841803c7, r28}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000600)={'vcan0\x00', r28}) r30 = socket$netlink(0x10, 0x3, 0x0) r31 = socket$netlink(0x10, 0x3, 0x0) r32 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r32, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r32, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r31, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r33, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r30, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r33}]}, 0x174}}, 0x0) r34 = socket$netlink(0x10, 0x3, 0x0) r35 = socket$netlink(0x10, 0x3, 0x0) r36 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r36, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r36, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r35, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060100"/20, @ANYRES32=r37, @ANYBLOB="fe00000000001c001200186a0100626f6e64000000000c00020008000100040000000000"], 0x3}}, 0x0) sendmsg$nl_route(r34, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000005d40)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x7, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE]]]}}}, @IFLA_MASTER={0x8, 0xa, r37}]}, 0x174}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000640)={'team0\x00', r37}) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000740)=""/95, 0x5f}], 0x1}, 0xffffffff}, {{&(0x7f0000000800)=@nl=@unspec, 0x80, &(0x7f0000000900)=[{&(0x7f0000000880)=""/102, 0x66}], 0x1}, 0xff}, {{&(0x7f0000000940)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000009c0)=""/2, 0x2}, {&(0x7f0000000a00)}, {&(0x7f0000000a40)=""/24, 0x18}, {&(0x7f0000000a80)=""/173, 0xad}, {&(0x7f0000000b40)=""/110, 0x6e}, {&(0x7f0000000bc0)=""/191, 0xbf}, {&(0x7f0000000c80)=""/227, 0xe3}, {&(0x7f0000000d80)=""/201, 0xc9}, {&(0x7f0000000e80)=""/134, 0x86}, {&(0x7f0000000f40)=""/4096, 0x1000}], 0xa}, 0x7fff}, {{&(0x7f0000002000)=@caif=@dbg, 0x80, &(0x7f0000002080), 0x0, &(0x7f00000020c0)=""/58, 0x3a}, 0x3}, {{&(0x7f0000002100)=@sco, 0x80, &(0x7f0000003540)=[{&(0x7f0000002180)=""/18, 0x12}, {&(0x7f00000021c0)=""/248, 0xf8}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/111, 0x6f}, {&(0x7f0000003340)=""/32, 0x20}, {&(0x7f0000003380)=""/87, 0x57}, {&(0x7f0000003400)=""/240, 0xf0}, {&(0x7f0000003500)=""/4, 0x4}], 0x8}, 0x5}, {{&(0x7f00000035c0)=@sco, 0x80, &(0x7f0000003840)=[{&(0x7f0000003640)=""/183, 0xb7}, {&(0x7f0000003700)=""/198, 0xc6}, {&(0x7f0000003800)=""/33, 0x21}], 0x3, &(0x7f0000003880)=""/104, 0x68}, 0x99}, {{&(0x7f0000003900)=@generic, 0x80, &(0x7f0000005ac0)=[{&(0x7f0000003980)=""/4096, 0x1000}, {&(0x7f0000004980)=""/237, 0xed}, {&(0x7f0000004a80)}, {&(0x7f0000004ac0)=""/4096, 0x1000}], 0x4, &(0x7f0000005b00)=""/97, 0x61}, 0x80000001}], 0x7, 0x10000, 0x0) r40 = socket$netlink(0x10, 0x3, 0x0) r41 = socket$netlink(0x10, 0x3, 0x0) r42 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r42, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r42, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r41, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r43, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r40, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000006480)=@newlink={0x188, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x160, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x150, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0xfffffffffffffe99, 0x3, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA, @IFLA_IPTUN_TOS={0x0, 0x5, 0xf}, @IFLA_IPTUN_ENCAP_SPORT={0x0, 0x11, 0x4e21}, @IFLA_IPTUN_ENCAP_TYPE, @IFLA_IPTUN_TTL={0x0, 0x4, 0x1}, @IFLA_IPTUN_ENCAP_DPORT={0x0, 0x12, 0x4e21}, @IFLA_IPTUN_ENCAP_SPORT={0x0, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x0, 0x11, 0x4e20}, @IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x1}]], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_ENCAP_LIMIT={0x0, 0x6, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r43}]}, 0x188}}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r44, &(0x7f0000000000)=ANY=[], 0xffb4) getsockopt$inet_IP_XFRM_POLICY(r44, 0x0, 0x11, &(0x7f0000006000)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000006100)=0xe8) r46 = socket$netlink(0x10, 0x3, 0x0) r47 = socket$netlink(0x10, 0x3, 0x0) r48 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r48, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r48, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r47, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r49, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r46, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r49}]}, 0x174}}, 0x0) r50 = socket$inet6_tcp(0xa, 0x1, 0x0) r51 = socket$inet6_tcp(0xa, 0x1, 0x0) r52 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r53 = dup2(r51, r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) recvmsg$kcm(r53, &(0x7f0000002640)={&(0x7f0000000040)=@can={0x1d, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000140)}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000002bc0)=""/249, 0xf9}], 0x6, &(0x7f0000002540)=""/239, 0xef}, 0x2061) ioctl$sock_inet6_SIOCADDRT(r50, 0x890b, &(0x7f0000002680)={@empty, @mcast2, @mcast2, 0x4, 0x8, 0x20, 0x100, 0x9, 0x841803c7, r54}) r55 = socket$inet6_tcp(0xa, 0x1, 0x0) r56 = socket$inet6_tcp(0xa, 0x1, 0x0) r57 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r58 = dup2(r56, r57) ioctl$PERF_EVENT_IOC_ENABLE(r58, 0x8912, 0x400200) recvmsg$kcm(r58, &(0x7f0000002640)={&(0x7f0000000040)=@can={0x1d, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000140)}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000002bc0)=""/249, 0xf9}], 0x6, &(0x7f0000002540)=""/239, 0xef}, 0x2061) ioctl$sock_inet6_SIOCADDRT(r55, 0x890b, &(0x7f0000002680)={@empty, @mcast2, @mcast2, 0x4, 0x8, 0x20, 0x100, 0x9, 0x841803c7, r59}) r60 = socket$netlink(0x10, 0x3, 0x0) r61 = socket$netlink(0x10, 0x3, 0x0) r62 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r62, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r62, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r61, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r63, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r60, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r63}]}, 0x174}}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8911, &(0x7f0000007500)={'lo\x00', @ifru_addrs=@can={0x1d, 0x0}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000007d00)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10010000}, 0xc, &(0x7f0000007cc0)={&(0x7f0000007540)={0x754, r7, 0x800, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r12}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x7c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}]}}, {{0x8, 0x1, r22}, {0x124, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r29}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}]}}, {{0x8, 0x1, r33}, {0x130, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r38}, {0x7c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x24}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r39}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8, 0x1, r43}, {0xfc, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r45}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}]}}, {{0x8, 0x1, r49}, {0xec, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r54}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r59}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x101, 0x3f, 0x8, 0xc33}, {0x100, 0x7, 0x0, 0x5}, {0x7, 0x7f, 0x4, 0x4}, {0x4, 0x6, 0x80}, {0x4, 0x1, 0xf8, 0x3ff}, {0x5, 0xc1, 0x9a, 0x4}, {0x9, 0xc5, 0x8, 0x80000001}]}}}]}}, {{0x8, 0x1, r63}, {0xc8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xdde2}}, {0x8, 0x6, r64}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xee3}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x754}, 0x1, 0x0, 0x0, 0x24040100}, 0x30008085) r65 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r65, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:43 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x0, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 708.311412] nla_parse: 1 callbacks suppressed [ 708.311419] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 708.483793] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:43 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f000000000000000000000000000000000000000000000000000000000000000000000007000000d737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6ba81eff000603cb711ea7f700afb7cb2745809fabca1062fc20af17b7834b9555ef202c6bd4c68a2f8943adc0f7cf9a884b6078b08b172a90e85102fa2622ba51c72e36084cf1e789c938163cb46d751d32b2d9edc4d1f7a88a550de53ee6feab28895b87431a231994b278db8927bcd17acbec55cf9e87556bee0165d5dbd3e43981716210fd3cbb5d4bc0ed90d31169c66c3211773402"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00'}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) getsockopt$netrom_NETROM_T1(r7, 0x103, 0x1, &(0x7f0000000080), &(0x7f0000000540)=0x4) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r8, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r9, &(0x7f0000000000)=ANY=[], 0xffb4) getsockopt$CAN_RAW_FILTER(r9, 0x65, 0x1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000240)=0x30) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x174}}, 0x0) 15:56:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x100, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000380)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x400, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x5, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @null]}) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)}, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000240)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='\b'], 0x1, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 708.652550] sp1: Synchronizing with TNC [ 708.671320] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:43 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000840)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d6365009fe6c0ad5838ac00000000000000000000000000000000004f2f000000000000000004380bd77760318ef4e239d4fd469ada14d097ba3b287341e4441ace83d3b5b4118b03ca28a468baec2aa0ec3f0000000000000059a7896dc926211c27290fd7c176cdfa19791a0000000000000000000000de000000ac5435cea2d36bce622b536143318164f53292e22231a49c23e2b59645f53092549356448f2c"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4083, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xffb4) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000500)=""/240, &(0x7f0000000140)=0xf0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x13) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r12 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r12, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRESDEC=r12, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c000200080001ef04000000"], 0x3}}, 0x40000) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="7401000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r11], 0x174}}, 0x0) 15:56:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) close(0xffffffffffffffff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r9, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 709.019682] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 709.139790] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:44 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xffb4) bind$inet6(r5, &(0x7f0000000140)={0xa, 0x4e22, 0x7, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9}, 0x1c) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x1, 0x7, 0x3, 0x3, 0x0, 0x0, 0x80000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}, 0x0, 0x6dcb, 0x1, 0x7, 0x20, 0xfffffffd, 0x6}, 0x0, 0xd, r3, 0x3) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r7, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe0080e9ff000c000100626f6e64000000000c0002000800010004000000000000000000"], 0x3c}}, 0x0) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r12, 0x40505330, &(0x7f0000000040)) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="7400000000000000000000000000008000000000d534477fdfa3f4d3288d2660ac672cddca3eaaf06aec844eee0705db888f77797daa2e779871c809ad5643c794b0a48170584865506253df955bd1dd8b99b1e808ea2368767e6d68b049fcb854114c01d768a35f820aee6841fb4c8327151e3f197c3d9752456dc362e448ed4f7511b1301e2a05ff3015d8ef1720ccbf36862eef2fc3cdc458113b70ebded48c0047c3ddfe5282de706c9145b1874ce07056fe7a7d6bb955483e39a760242a15a423fd72a9b2330ddb91b1e3d8c4cccfe704601711226aaeae7d04fd4c32b0e82a7346c4aa6af94f81e83de9146edea3e5", @ANYRESDEC=r12, @ANYBLOB="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", @ANYRES32=r11], 0x4}}, 0x1) [ 709.272941] overlayfs: filesystem on './file0' not supported as upperdir [ 709.344332] audit: type=1400 audit(1576166204.363:93): avc: denied { map } for pid=3915 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:56:44 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:56:44 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000180)=0xf, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x80801, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x44) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00') mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) [ 709.806638] audit: type=1400 audit(1576166204.523:94): avc: denied { map } for pid=3918 comm="net.agent" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:56:45 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r1, 0x0) r2 = request_key(&(0x7f00000005c0)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000140)='\\$[+%*/^\x00', r1) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r2, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) prctl$PR_GET_CHILD_SUBREAPER(0x25) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c000000100085060000000000000000000000006f46ec6a309590", @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e2c}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x3}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7fffffff}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) [ 710.041438] sp1: Synchronizing with TNC [ 710.062324] sp2: Synchronizing with TNC [ 710.461536] audit: type=1400 audit(1576166204.523:95): avc: denied { map } for pid=3918 comm="net.agent" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 710.614859] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 710.772165] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 710.886469] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 711.033511] audit: type=1400 audit(1576166204.533:96): avc: denied { map } for pid=3921 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:56:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r1, 0x0, r2, 0x0, 0x422000a7b, 0x0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20480012}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xcc, 0x0, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @local}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x13}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xff}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xbad}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xbe25}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0xc00c0}, 0x1) close(r0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x100, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[], 0xffb4) write$P9_RAUTH(r6, &(0x7f0000000200)={0x14, 0x67, 0x2, {0x40, 0x2, 0x7}}, 0x14) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r7, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:46 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") pipe(&(0x7f0000000380)={0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0xc) writev(r3, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r2, 0x0, r3, 0x0, 0x422000a7b, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000140)=0x81) r4 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r4, 0xab2ee000) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r7, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) [ 711.655664] audit: type=1400 audit(1576166204.533:97): avc: denied { map } for pid=3921 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:56:47 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 712.223295] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 712.245262] audit: audit_backlog=65 > audit_backlog_limit=64 [ 712.252023] audit: audit_backlog=65 > audit_backlog_limit=64 [ 712.262604] audit: audit_backlog=65 > audit_backlog_limit=64 [ 712.284583] audit: audit_backlog=65 > audit_backlog_limit=64 [ 712.322132] audit: audit_backlog=65 > audit_backlog_limit=64 [ 712.624986] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:48 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000240)=0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="740109000000000000000000000000d574000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r10], 0x174}}, 0x0) [ 713.784025] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 713.807800] sp1: Synchronizing with TNC 15:56:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xfffffffffffffe78}, &(0x7f00000006c0)=ANY=[], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038bf8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcf8c20582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000740)="2c1122a324a50e9208eefca0ceaeffff35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f2d44ab3bdb2427cbdb97a2115947385ce2fdbf2524ab1e6c67f7c8ac7976300339c2fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74c5cc6f1cca9ce597d4c866b0cf5f9a5c66a7cb954f1b10003a39e95ed95458d745e9208e26c1f000005b5ac75af00"/210) r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x2000, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040028bd7000fddbdf250900000008000600ffffffff0c0002000800040005000000080006000300000054000200080003000400000008000800ff000000080006000e00000008000e004e2200000800070001000000080006003db60000080005000200000008000b000a00000008000d0000000000080002004e24000008000600050000000800050000040000"], 0x94}, 0x1, 0x0, 0x0, 0x800}, 0x72b5515a1b7cd0a4) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r6, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r7, @ANYRES32=r4], 0x5}}, 0x80) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:56:49 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000180)=0xf, 0x4) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x80801, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x44) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00') mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) [ 714.739546] kauditd_printk_skb: 176 callbacks suppressed [ 714.739553] audit: type=1400 audit(1576166209.753:255): avc: denied { map } for pid=3987 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.390302] audit: type=1400 audit(1576166209.753:256): avc: denied { map } for pid=3987 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.476309] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3998 comm=syz-executor.5 [ 716.000081] audit: type=1400 audit(1576166209.843:257): avc: denied { map } for pid=3987 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 716.242605] audit: audit_backlog=65 > audit_backlog_limit=64 [ 716.248517] audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 [ 716.405532] audit: audit_backlog=65 > audit_backlog_limit=64 [ 716.405539] audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 15:56:51 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 716.531713] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 716.567996] audit: type=1400 audit(1576166209.903:258): avc: denied { map } for pid=3987 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 716.649792] audit: backlog limit exceeded 15:56:51 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r12 = socket$netlink(0x10, 0x3, 0xc) writev(r12, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r11, 0x0, r12, 0x0, 0x422000a7b, 0x0) write$ppp(r11, &(0x7f0000000540)="05754f8746f8596bdec6e8462fef2f1bab94621b05b8ed3a87c3bfd91172ea24172ceee04fa1b7e04c3e12f53d88186d7b252ae25357de226f5419e5135ddbec6e0cca5af4df78dedfd46a557fe32a447996bb12f9b46242abe4220444e5d3db4329374a1abb80913bef50f6087480ea04121e689ef3848c72642611eb15b1a1c3837e22cd85439bdada592acf3e33a2dcf04d0122c7859c8d2d147f034ac5098ad0ca5aff87c8a87dd285d8099c549a35ad8a9843656b9429568da55544c7ecb0", 0xc1) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 716.851364] audit: backlog limit exceeded 15:56:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) bind$vsock_dgram(r1, &(0x7f0000000040), 0x10) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/233}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:52 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = semget$private(0x0, 0x4, 0x1f4) semctl$SETALL(r10, 0x0, 0x11, &(0x7f0000000140)=[0xacc5, 0x2, 0x6, 0x7, 0x0, 0x401]) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:56:53 executing program 1: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x13) getsockname(r0, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[@sack_perm, @mss={0x2, 0x1}, @window={0x3, 0x4, 0x3ff}, @mss={0x2, 0x40}, @mss={0x2, 0x1}, @mss={0x2, 0x3}], 0x6) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x6228, @dev={0xfe, 0x80, [], 0x29}, 0x5}, 0x1c) sendfile(r2, r3, 0x0, 0x7fffffff) 15:56:54 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) socket$inet6(0xa, 0x3, 0x90) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 719.444587] bond86 (uninitialized): Released all slaves [ 719.776872] kauditd_printk_skb: 197 callbacks suppressed [ 719.776880] audit: type=1400 audit(1576166214.793:432): avc: denied { map } for pid=4028 comm="syz-executor.5" path="/dev/snd/seq" dev="devtmpfs" ino=17458 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 719.874858] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:56:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000040)={0x0, @pix_mp={0xfffffffc, 0x8, 0x3436324d, 0x5, 0x2, [{0x0, 0x3}, {0x2, 0x4}, {0x81, 0x8}, {0xe32, 0xae}, {0x6, 0x7}, {0x7, 0x7f}, {0x2, 0x9e}, {0x7, 0x1f}], 0x4, 0x9, 0x0, 0x1, 0x4}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x7) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:56:55 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x190, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MAP={0x24, 0xe, {0x6, 0x0, 0x8000, 0x0, 0xb9, 0x2}}]}, 0x190}}, 0x0) [ 720.439975] audit: type=1400 audit(1576166214.833:433): avc: denied { map } for pid=4026 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.101692] audit: type=1400 audit(1576166214.833:434): avc: denied { map } for pid=4028 comm="syz-executor.5" path="/dev/ashmem" dev="devtmpfs" ino=17423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 721.187108] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x10007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f00000000c0)={'bond0\x00', @ifru_flags=0x1000}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) getegid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 15:56:56 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000040000004f2f0000000000000000000000000000000000000000e57cd3570000000600000000000000001100000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83f3"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r3, 0xc0305616, &(0x7f0000000140)={0x0, {0x6, 0x71d}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$sock(r4, &(0x7f0000000bc0)=[{{&(0x7f0000000500)=@nl=@kern={0x10, 0x0, 0x0, 0x40000000}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000580)="91f3b01e8fcf3f7a5fabc0833dc3e0a081053e58619ffdd861cda11a0528e3c7f8441eda198585335a714dd0589e677f7c2e46589a86d82dc672862932866dee68132d8659260f0f5d91b5ad944fc6408a81f26515d0cc72b5076d61cb380c339c6fa234bc778a1e68b11ccec5e725d5240704fa53c86e160a5f81a0a33950f2d726a695afdc8f338f04a3e747cd8811c3687c4cc0f7889a7303", 0x9a}, {&(0x7f0000000740)="406009eb9e629f79fa450b542d03754e1a3552bfab1e454f23e14a9a5269295952591e3841e5f9dc7f670e9b9611cd694d203c24155220b376efbaa14723fa07364a8ef81b359a089be7a44c27866938d5f34d3b16ab1d8d889873529ba2eac9ae51d6a9869a80cca66bf075ac261e28697c47c67a343d6304bff8110ebbb60e4b12ebbe67b38e2656eb03d7bcecc9fb2fad7a766ec2bd6b5efe502175da798ff237cdb39f915e5c4fe44504a69441e50501b4ed76e7783a16d9528b1b4b30cea9e439c559b6ee59dc44a674b5be5704c1be9bd54fe804ed415dcec307c13900baa82ac4b9", 0xe5}, {&(0x7f0000000240)}], 0x3, &(0x7f0000000840)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0xf322}}], 0x90}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000680)="0bae4aeaa8d79414fa1a76bff2fc21ca59d150fb9c93ebd5007063d4ed2c9b", 0x1f}, {&(0x7f0000000900)="c54c2561dee5e24555b3022b8b0ecea53a15f1c6c80fc5ff3a383ed71b9d42f4db1b5f325bca3ea15db4b6bc25601a32c8c181f1d74baf3bd966735ac117e6aed44054501271ef2a959411b79c373ae6b33041b975b29a6dda7bcb2cc545c6a3e386e6f6066ab74c4c7f8af4a4", 0x6d}, {&(0x7f0000000980)="10fcce0e2679e8252a76a2b8b1bf8595ee287c23697045ac787b890fa093a89e957747799038fe4c9e88f4af4a653e04b2178e57b5a67416d0c480e789b6dff329028a7275b74010d71ad8683924590a1184692794a7625910da06b9636835463bd0931f6c975b399ba1a44d9baf2977e55b821f8247eef97ddaaf8fb2cb8faee2076232f5fdc517e93ba718d146d15ecca3c30aaaf634", 0x97}, {&(0x7f0000000a40)="0d3e1f72b03002", 0x7}, {&(0x7f0000000a80)="956dea862c9d818a3c4e774af1fb0c7a613c133f5820799ee1063ca5945515a43db0f74116abceec0ee40b397718e4623b719e186533b9cc78f958cba7b0bfbc5fae0701f8fee132f3c14c8d0767a7307417f9be68e1b116bbbe60fc3eec22cd9b52913db685557d41dfdcfbb49d85668278148b0ff425f48e5b461f15bbcfe714df1d6ccaa0e40556660edddbf87b0771a247b902acd4069a08ccf293d86e795b8c6360dfccf32d620025a2b0956188c2962c1a", 0xb4}], 0x5}}], 0x2, 0x4000000) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[]}}, 0x0) [ 721.746702] audit: type=1400 audit(1576166214.843:435): avc: denied { create } for pid=4028 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:56:57 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) socket$inet6(0xa, 0x3, 0x90) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 722.339725] sp1: Synchronizing with TNC [ 722.464562] audit: type=1400 audit(1576166214.863:436): avc: denied { create } for pid=4028 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 722.827954] audit: audit_backlog=65 > audit_backlog_limit=64 [ 722.876875] audit: audit_backlog=65 > audit_backlog_limit=64 [ 722.984843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 722.997631] audit: audit_backlog=65 > audit_backlog_limit=64 [ 723.007946] audit: audit_backlog=65 > audit_backlog_limit=64 [ 725.792433] kauditd_printk_skb: 142 callbacks suppressed [ 725.792441] audit: type=1400 audit(1576166220.813:569): avc: denied { map } for pid=4103 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 726.580134] audit: type=1400 audit(1576166220.843:570): avc: denied { map } for pid=4103 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.054104] audit: type=1400 audit(1576166220.853:571): avc: denied { map } for pid=4103 comm="ps" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.630137] audit: type=1400 audit(1576166220.893:572): avc: denied { map } for pid=4103 comm="ps" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.630154] audit: type=1400 audit(1576166221.073:573): avc: denied { map } for pid=4105 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.630174] audit: type=1400 audit(1576166221.073:574): avc: denied { map } for pid=4105 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.630194] audit: type=1400 audit(1576166221.073:575): avc: denied { map } for pid=4105 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.630209] audit: type=1400 audit(1576166221.073:576): avc: denied { map } for pid=4105 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.630224] audit: type=1400 audit(1576166221.123:577): avc: denied { map } for pid=4104 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 729.390077] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:57:04 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) socket$inet6(0xa, 0x3, 0x90) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:57:04 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) syncfs(r4) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:57:04 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r9, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r9, 0xc0406618, &(0x7f0000000140)={{0x0, 0x0, @reserved="95c16f2dde3013cb72b7213688a4d3aba293bf9794602185d85016bc0d9c1c34"}}) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0080001000850600000000000000000000000033f0967cdc86542e0e1ce41f81ae480ce77d08c771160b227c25f0ff9345039fcfbe8bee209e6a4d86001258e5466707f33b93bde7ffd4693382213db7426289d6385de91e9b4a5745ef2a2a904c6be481a2fb609784998d24b3b1100bc65608241dd391471eafb270b182c230adb6fdc60884c5fbb86b679e6dce0019ca6ed5351395d49146e4", @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:57:05 executing program 1: 15:57:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$MON_IOCG_STATS(r4, 0x80089203, &(0x7f0000000040)) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 731.140087] audit: type=1400 audit(1576166221.123:578): avc: denied { map } for pid=4104 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 731.696051] audit: type=1400 audit(1576166221.123:579): avc: denied { map } for pid=4104 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:57:06 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:57:07 executing program 1: [ 732.387564] audit: type=1400 audit(1576166221.123:580): avc: denied { map } for pid=4104 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 732.757105] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:57:07 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x40280, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', r10}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="f1985a7f0069000000000100000008000500", @ANYRES32=r11, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r15, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r12, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r15}]}, 0x174}}, 0x0) 15:57:08 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000a00)=ANY=[@ANYBLOB="7401000010001fff00002d544eb3659c459f0000f5afe31a15077257e28d4af4c9353238060d295eb2d0a6bf60b6d874d5926ea8e45bd1b1331062845ffcb7688ec3c504bbb70363437a53724ad6abaa926b871eed90e1259c47ac6809d107cc57649ad35288e798fc6b439ef9aa1920e79243124ffacf3d9e207a668c34a7f7b6a45a69cf1116", @ANYRES32=0x0, @ANYBLOB="00000000000000004c0112000c000100697036746e6c00003c0102000800080005005a08556311004e240000080011004e20000004001300080007000300008014000300ff0200000000000000000000000000011400030043739fee2404ff42b120dede2d7dbfda08000900040000000800090004000000080009000400000014000300ff010000000000000000000000000001080007000400000008000900040000000800060008000000080008001c000000080008000f0000000400130008000500ed0000000800140087f1000014000200fe8000000000000000000000000000110800070009000000080008002700000014000300fe8000000000000000000000000000aa080007000700000008000800330000000800070002000000080006000900000014000200fe8000000000000000000000000000bb08000700010000000800070004000000080008002d00000008000a00396ae8001800ed903d963eb93b255659d69f1226c32e9821361c20f1bd822239c7e36fedcdcf7691365ebdf7168920df347ac6b7718f31b477cdc6c5b4b6aae962acedb0a2ccd15602313a6bc29bc225730afc3f45f9208f8965a1be5dfb366d7ad9d153e0945d806a153768b4a4b06e4447a1376169462cb91b730b8281398b9b14aeb542407ccadb55926d26b302f4deb606b6b16d50dd3f6c639357ca5db4904ef0e571e2d3fe79", @ANYRES32=r10], 0x174}}, 0x0) [ 733.063116] sp1: Synchronizing with TNC [ 733.311951] audit: type=1400 audit(1576166221.423:581): avc: denied { map } for pid=4103 comm="ps" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:57:08 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000008c0)=ANY=[@ANYBLOB="656e633d72617720456173683d67686173080000000000000000000000000000000000a673d378100b82ca0000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b020e9a7a51143313f83fe1ae71f6e89c3d537378812dd8a21d7393852abc5573d7522cff98492429651519fcac"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000980)='/dev/dlm\x80\x00\x00\x00itor\x00', 0x121000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff7c, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x20, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0xfffffffffffffeaa, 0x2, [{0xfffffffffffffedb, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f, 0x4, 0x3}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCINQ(r11, 0x541b, &(0x7f0000000540)) r12 = socket$netlink(0x10, 0x3, 0xc) writev(r12, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r10, 0x0, r12, 0x0, 0x422000a7b, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000140)={0x8, 0x0, 0x10001, 0x7}) ioctl$DRM_IOCTL_AGP_FREE(r10, 0x40206435, &(0x7f0000000240)={0x81, r13, 0x10000, 0xffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = accept$packet(r15, 0x0, &(0x7f00000006c0)) getsockname$packet(r16, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r19 = socket$netlink(0x10, 0x3, 0xc) writev(r19, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r18, 0x0, r19, 0x0, 0x422000a7b, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r18, 0x8936, &(0x7f0000000580)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x32, r6}) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r17, @ANYBLOB="fe000000000061df0000000000000100626f6e64000000000c0002000800010004000000ae9bcb6db6d7eb4b71d190d651323f6b449aca9beaaab8d5adef3c36a71d983b824f051e5993a0e311a9fdabd0074fc76f1627f826df774025d5bd40cda146767df9812a6ab8f53ac6391c51f4f8c86a00f25b81b3ea99c0b6d40d9084a490619163c4288b0694ad1cbd324474c445f7813ddf99a3818a936c9e48c685ae30b182bbe61984e3994af35f46559d2da9c2dd9483d6d7209a7fdb65f973fbd38e"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x168, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x140, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x130, 0x2, [@tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x9}, @IFLA_IPTUN_TTL={0x8, 0x4, 0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r17}]}, 0x168}}, 0x0) [ 733.930113] audit: type=1400 audit(1576166221.423:582): avc: denied { map } for pid=4105 comm="grep" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:57:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) pselect6(0x40, &(0x7f0000000080)={0x1, 0x10000, 0x1, 0x2e2, 0x8000, 0x2, 0x1000, 0x6e}, &(0x7f00000000c0)={0x7, 0xffff, 0x8001, 0x100000001, 0x100, 0x10001, 0x316ab0b9, 0x8}, &(0x7f0000000100)={0x7, 0x1, 0xc033, 0x9, 0x2, 0xd087, 0x2e, 0x7}, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180)={0x801}, 0x8}) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 734.457265] audit: type=1400 audit(1576166221.433:583): avc: denied { map } for pid=4104 comm="grep" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:57:09 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:57:09 executing program 1: [ 735.012172] audit: audit_backlog=65 > audit_backlog_limit=64 [ 735.104096] audit: type=1400 audit(1576166221.433:584): avc: denied { map } for pid=4104 comm="grep" path="/lib/x86_64-linux-gnu/libdl-2.13.so" dev="sda1" ino=2703 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 735.187143] audit: audit_backlog=65 > audit_backlog_limit=64 [ 735.190578] audit: audit_backlog=65 > audit_backlog_limit=64 [ 735.261181] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 15:57:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$FBIOPAN_DISPLAY(r8, 0x4606, &(0x7f0000000540)={0x356, 0xa0, 0x80, 0x2000, 0x3, 0x0, 0x8, 0x0, {0x5, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0xb6f, 0xfff, 0x1}, {0x5, 0x6, 0x1}, 0x1, 0xc2, 0xfffffffc, 0x0, 0x0, 0x6, 0x4, 0x2, 0x7, 0x9, 0x9, 0x0, 0x34, 0x0, 0x3, 0xc}) ioctl$sock_netrom_SIOCADDRT(r8, 0x890b, &(0x7f0000000600)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x7, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x0, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0xd7aa}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x50}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) [ 735.642687] bond660 (uninitialized): Released all slaves [ 736.151370] kauditd_printk_skb: 116 callbacks suppressed [ 736.151378] audit: type=1400 audit(1576166231.103:656): avc: denied { write } for pid=4147 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 736.507075] netlink: 340 bytes leftover after parsing attributes in process `syz-executor.5'. [ 736.674863] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:57:11 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 736.792318] netlink: 340 bytes leftover after parsing attributes in process `syz-executor.5'. [ 736.911301] audit: type=1400 audit(1576166231.173:657): avc: denied { read } for pid=4147 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:57:12 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000140)) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="7401000010001fff00000000000000000000000029b069641b000000fa080c712da026865c15b7b8f9cab5dd5847274570587829af", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r10], 0x174}}, 0x0) [ 737.183010] sp1: Synchronizing with TNC 15:57:12 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:57:12 executing program 1: [ 737.634368] audit: type=1400 audit(1576166231.203:658): avc: denied { write } for pid=4147 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 738.245573] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 738.352232] audit: type=1400 audit(1576166231.223:659): avc: denied { ioctl } for pid=4147 comm="syz-executor.0" path="socket:[146080]" dev="sockfs" ino=146080 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 738.982664] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 739.216294] audit: type=1400 audit(1576166231.343:660): avc: denied { map } for pid=4148 comm="syz-executor.5" path="/dev/ashmem" dev="devtmpfs" ino=17423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 739.256063] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:57:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r8 = socket$netlink(0x10, 0x3, 0xc) writev(r8, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r7, 0x0, r8, 0x0, 0x422000a7b, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r9, 0x40505330, &(0x7f0000000040)) r10 = dup(r9) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r11 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000040)=0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r13, 0x40505330, &(0x7f0000000040)) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r15 = socket$netlink(0x10, 0x3, 0xc) writev(r15, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r14, 0x0, r15, 0x0, 0x422000a7b, 0x0) r16 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r16, 0x40505330, &(0x7f0000000040)) kcmp$KCMP_EPOLL_TFD(r11, r12, 0x7, r13, &(0x7f00000000c0)={r14, r16, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r0, r10, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2ab) 15:57:14 executing program 4: 15:57:14 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[], 0xffb4) setsockopt$inet_MCAST_LEAVE_GROUP(r7, 0x0, 0x2d, &(0x7f0000000540)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x2, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:57:14 executing program 1: 15:57:14 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 739.991750] audit: type=1400 audit(1576166231.343:661): avc: denied { create } for pid=4148 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 740.344620] netlink: 340 bytes leftover after parsing attributes in process `syz-executor.5'. [ 740.431888] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:57:15 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r9, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x174}}, 0x0) [ 740.672135] audit: type=1400 audit(1576166231.343:662): avc: denied { create } for pid=4148 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 741.135185] sp1: Synchronizing with TNC [ 741.314853] audit: type=1400 audit(1576166231.353:663): avc: denied { write } for pid=4148 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:57:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) shmctl$IPC_RMID(r0, 0x0) shmctl$IPC_INFO(r0, 0x3, 0x0) [ 741.989110] audit: type=1400 audit(1576166231.393:664): avc: denied { ioctl } for pid=4148 comm="syz-executor.5" path="socket:[146084]" dev="sockfs" ino=146084 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 742.037556] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.0'. 15:57:17 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) io_setup(0x10000000005, &(0x7f00000005c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000580)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r1, 0x2, 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f00000000c0)={0x0, 0x1c9c380}) [ 742.725443] sp1: Synchronizing with TNC 15:57:17 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 742.811590] audit: type=1400 audit(1576166231.443:665): avc: denied { write } for pid=4148 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 742.842486] audit: audit_backlog=65 > audit_backlog_limit=64 [ 742.951425] audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64 15:57:18 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000003a40)={0xa, 0x0, 0x0, @rand_addr="43adae045ba425540566c44f7867f246"}, 0x1) sched_getscheduler(0x0) mkdir(0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f0000000400)=0x1000) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f00000004c0)={"c8024a3f7c2c84a2ac959fe78307f4ecbdec5e0657bfa810018f7665b5a974c17d24dda716692e44ee2d87a9a48581473dbb5ba48ad23781249c306f5e79cc2cadc94ebbdd5b5507180e638e2df60616f29bdcd8fd055c8900b885ff4c85ab269cfadf7b4f0a57ce82d9bf2b61e806554b4ecb17534510e599d65a516e6c541502c80bea595c0b7cf6c56b6931926e4b43a4b898b7b394848667f2906a0aa43e9edc65171b5828bd396271395907b52531a531eadc73c16d26553435a5d91a84985d2487249ea82d9efc74abe46042fecc8d47fa45dec2614b32876c710dfef7baa0c6edbf522af51ce28120c1075a7a8de5a99aa39ffab40deb5308c03080fee374c8110e68f1a4ad4e1863dee733f781411109fd56861cb957c9ec3584f742ec6ea7b8736f719ddb4c0bcb14e0d9011b5ca0b22ca7f37e26d9c783795b537818330aa620687763dfd63e048b9a999c6ecab26ae69a7a526f58d7ae1f53f0b99c8c19fbb231e22a8564bc019e31fc0bdf8c9770172655b7206b076068a934c04d244e5e104fd2c77435123cf2d3e0358ddb6715c7380be5ac675ab1a0c8e711cf609ed74d4bc963e8ea9001c5102e5aa360bcf5b40785fdeb49867606ebfb628f542faf6166a15f983a83c8b01a602eccb91c215d0bab7a1bc17f6e0d63cb932567e03b2f1b96a8981955f9f4041c8e20f22ce4b68522881292f04e03182e83f921e914608f84504afc5fd8c0c430d90372aba47ae466e7f02d639728e680fd279012e572e13c91748c37c81d163d58ebc357c145c2eb089a463634cd50ef884b79acf4edfef17ea4a702063827498ca74cb76f3877b37f615e33ccc65033629eb80a2e976a3c27e80e405ab5133faea5fa9371bb5a41e3b9fbc972aa13f27a2fbd33add9456b44e5a715ace5e9f0727ca9c9d83048d1f663a5a471b5bfff8efedb9745701d4023f30ff688a8a6dedaacab389cdda9d4ca1c6eeadc877137ca5482dc0bff0cd507d6ab75e85f0c4047b05b6c83f5724b3b35f38cf234052f63f7d7a3757d6988a140862bb0017bae0e37ddff98eec4a01d0f8aaabf049842bb6a860a473cde435bea84cc4a56b83d5f282a0bc68821fdaba67f3205b2db49c93627fad042221205e465d847f86be54d8b6e8b57c3354387c3fbf8a8d51c0ef8f8b2b1171470b708eb1c67f73c28ca7c6df4145094e8b2ff6af8b0c336b9262d00705dc5d72a1c61ce7ac211b4f947b5a3b0c108841d87f67eb1fb75dead562c1d4db307e02cf81d2fc5c7de5284140ed6cf705f55cdc3911dac2b8e07396208a58750ea40a8abb0cca1a9300c4f5b6d58b0457edfeb70af7ccbbe15db99607b66c6a7ebcdbfd35a2fd96f880e847c1757ecf3f33255c4f573de0bde9194cd8e6bffb97dd2c739c070482f7ec5153abc3f5eed6bae884f34089a38cb79e88c7d"}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB]) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000a80)={0x0, 0x0}) r6 = creat(&(0x7f0000000400)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x2}]) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$KVM_RUN(r5, 0xae80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) [ 743.044224] audit: audit_backlog=65 > audit_backlog_limit=64 [ 743.090720] audit: audit_backlog=65 > audit_backlog_limit=64 [ 743.158791] audit: backlog limit exceeded [ 743.164952] audit: audit_backlog=65 > audit_backlog_limit=64 [ 743.237776] audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64 15:57:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x4f, 0x0, 0x83, 0x9, 0x0, 0x80, 0x24, 0x7, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f0000000200)}, 0x4, 0x8, 0x7ff, 0x5, 0x10, 0x1}, r2, 0x4, 0xffffffffffffffff, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x41, 0x0) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000080)={0xa47, 0xcba, 0x4c}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/]ev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x513000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[], 0xffb4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000340)={0xffff, 0xb33, 0x4, 0x2b, 0x0, 0x1, 0x7, 0x9f6f, r6}, &(0x7f00000001c0)=0x20) pipe(0x0) r8 = getpid() r9 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) write$P9_RCREATE(r9, &(0x7f0000000440)={0x18, 0x73, 0x2, {{0x2, 0x1, 0x1}, 0x8}}, 0x18) sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) rt_tgsigqueueinfo(r8, r10, 0x21, &(0x7f0000000280)={0x13, 0x3, 0x4}) socket$netlink(0x10, 0x3, 0x0) r11 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r11, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:57:19 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r10, &(0x7f0000000000)=ANY=[], 0xffb4) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40014001) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="58010000000000000000000000efff0000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000300112000c000100697036746e6c00002001020008000800050000001400020000000000000000000000000000000001080007000300008014000300ff0200000000000000000000000000011400030043739fee2404ff42b120dede2d7dbfda08000900040000000800090004000000080009000400000008000900040000000800060004000000080008001c000000080008000f0000000400130008000500ed0000000800140087f1000014000200fe8000000000000000000000000000110800070009000000080008002700000014000300fe8000000000000000000000000000aa080007000700000008000800330000000800070002000000080006000900000014000200fe8000000000000000000000000000bb08000700010000000800070004000000080008002d00000008000a00", @ANYRES32=r11], 0x158}}, 0x0) 15:57:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x8}, 0x1}, 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x5, &(0x7f00000003c0)=0x0) io_submit(r6, 0x4110, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) sendfile(r3, r4, 0x0, 0x8000fffffffe) 15:57:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf32(r2, 0x0, 0x0) poll(&(0x7f0000000180)=[{r1}, {r0}], 0x2, 0x0) 15:57:20 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:57:20 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xffb4) getsockopt$IP_VS_SO_GET_SERVICE(r5, 0x0, 0x483, &(0x7f0000000640), &(0x7f0000000140)=0x68) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r7, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e7400eafa0000000000000000000000086f0300030000000f02040000000000923e02f639659794a2066c24e28c7a0984723cc9b21173acd218139de20032e579af297255ce9b4934db14634d7d0de4e278e01c1608f1283631b6bcad0ff526baa174e4a6b009255b68b6f56a9590f6ed01b0468f613e5d1a419d218cf4566be7237f86862dd43e41539efc7df466643589b1493ecfc8c16f5991b724ff8b512dca6f4cae1ac6f00e568437e62ed44f"], 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0xfffffffffffffdf0, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) [ 746.298579] sp1: Synchronizing with TNC [ 746.349098] kauditd_printk_skb: 92 callbacks suppressed [ 746.349106] audit: type=1400 audit(1576166241.363:747): avc: denied { map } for pid=4269 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 746.670627] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4274 comm=syz-executor.5 [ 747.147148] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4283 comm=syz-executor.5 [ 747.193710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4284 comm=syz-executor.5 [ 747.268207] audit: type=1400 audit(1576166241.363:748): avc: denied { map } for pid=4268 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 747.275495] audit: audit_backlog=65 > audit_backlog_limit=64 [ 747.320753] audit: audit_backlog=65 > audit_backlog_limit=64 [ 747.326587] audit: audit_lost=46 audit_rate_limit=0 audit_backlog_limit=64 [ 747.400570] audit: audit_backlog=65 > audit_backlog_limit=64 [ 747.406510] audit: audit_lost=47 audit_rate_limit=0 audit_backlog_limit=64 [ 747.426485] audit: audit_backlog=65 > audit_backlog_limit=64 [ 747.460497] audit: audit_backlog=65 > audit_backlog_limit=64 [ 747.466425] audit: audit_lost=48 audit_rate_limit=0 audit_backlog_limit=64 [ 751.696073] kauditd_printk_skb: 168 callbacks suppressed [ 751.696081] audit: type=1400 audit(1576166246.713:865): avc: denied { map } for pid=4306 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.280106] audit: type=1400 audit(1576166246.713:866): avc: denied { map } for pid=4306 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.800125] audit: type=1400 audit(1576166246.713:867): avc: denied { map } for pid=4306 comm="ps" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.410292] audit: type=1400 audit(1576166246.873:868): avc: denied { map } for pid=4306 comm="ps" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.452234] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:57:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000001680)=[{{0x1}, {0x0, 0x0, 0x0, 0x1}}], 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="006d216f00c6"], 0x6) gettid() r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x0, 0x0) 15:57:28 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 753.604053] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.0'. 15:57:28 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[], 0xffb4) setsockopt$inet_MCAST_LEAVE_GROUP(r7, 0x0, 0x2d, &(0x7f0000000540)={0x1, {{0x2, 0x4e24, @loopback}}}, 0x88) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x2, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:57:28 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000140)={0x16, 0x15, 0x15, 0x1b, 0x9, 0x5, 0x4, 0x105}) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x11c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xf4, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xfffffffffffffd9c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @IFLA_IPTUN_ENCAP_LIMIT={0x0, 0x6, 0x8}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0xf9}}, 0x8000) 15:57:29 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000140)) [ 754.211258] audit: audit_backlog=65 > audit_backlog_limit=64 [ 754.217098] audit: audit_lost=66 audit_rate_limit=0 audit_backlog_limit=64 [ 754.270247] audit: type=1400 audit(1576166246.923:869): avc: denied { map } for pid=4309 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:57:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x40ff, 0x8, 0x5, 0x40, 0x18, 0x5, 0x7f, 0x20, 0x1000, 0x6, 0x7, 0xb0c2}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0), 0x2, 0x2}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000100)=0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x900}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x23a0, 0x0, 0x6, 0x300, 0x70bd2c, 0x25dfdbfe, {0x5, 0x0, 0x6}, [@typed={0x8, 0x25, @u32=0x88f}, @generic="0da1e7519da9bad998bacff6ea61b1f8de01c800505469b9658ee558a6e72849fa5d101b20fad6adf3c5a4c6570cf8a06d97bed0e6dbca2a63ace12f1c1a36ec0aa88e3ccec5f9d07d0caf436af2e05a0d07f78a00947d41473dd22a37f89c28b00062a78dc8d0c6db85bbcae4683ee62ca8", @typed={0x14, 0xb, @ipv6=@mcast2}, @generic="315968c92f3fb796c57872c52f5ba68202ace476e08e2387f519d3022163d3076ccb896eb264117538183d775a955966367e0ef6691c34d1058d70c17d14edb75a8948db9bcd5fb5f412cb33002dff93b9725c4c0696e2b9633b63eadc75c9e1485a76c5631ce5e3342d13f27656a0ce641260bb610e5777268905d481d84b97c9c5f2aa114060651fa6fcbcf5980296b0", @nested={0x226c, 0x75, [@generic="358a7ea6d79b2ecfbbbe0f33bc6ab8fe86eb61ed7cd5e36a0804ba69a20a4307d924c2dd00c869d956cb5ce708ef4d3a8b4863ba29b55d80a3dd32519c9fb0312440298a2f35dcd8b8e1a2e10fbeb399b7f4c9136dca0563921d3e39805cb43407af3d2fc4df", @generic="21a78c7e596c33b6a99de473bbe9482402dbcc1f5edd8b2ad2c8447bbd9a2026b9376e0ec301fd2b1ad1883788545f0467f65e90ddc7fe56f6f16aab26dc1f65cb3d4fbdc66291adff444d14eaf63ee82d71c2523a1631018fb7ea607b9bf05c8d0dc959b8ff296713de53183791eea6ce68f14fa4798eaf588003e817fb3763f2292789b5e05f94b17bae39415a95acb4a1aefb2aa3fd0ba1", @typed={0x8, 0x6b, @pid=r6}, @generic="a0ce17e9d301e2eacfecb67f602bc96ebca4fa9f644899abd9f7794ad04812f83b38f63ac8c07f7a14cb702d2d7e356ba1a09953b46de8d637fc4c9374c436fd703715461d8fe129c3e00c3a064c6eb530cae880e25c8cc6971cf0a14acc63e19674bad13a1c909e196ea8cfc313bb46", @typed={0x1004, 0x64, @binary="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"}, @generic="3e1a90d19a4ebe9f72e556e28888740a4aa79af973209a0919dc969fa317da0ca23c758d558f20a25ea736565b19fd0dbb37506b32f32f991904c8065d6719698deb9aca64821f5f2e0757a92776864e5814af9febaa7d86ebaa5402069b3b7f94f57589e33be51408e89e3bfaca0575b75bca6e78a128d6dd36cb42d35367d9793a74b4d1310f54703f59b45bdf6d646ca772474ae78c6971160e99fbe7313ad54d50f868d6d3b5285590597604e66cbab1b9e9a1ec70a51411b69c29f36bfaf76c2a3859fbfbbd6a8cb9ef6d9ddf009b608a7309f7bcf3e4", @typed={0x8, 0x5c, @u32=0x3}, @typed={0xc, 0x86, @u64=0x4}, @generic="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"]}]}, 0x23a0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) r7 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.origin\x00') r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r8, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 754.615445] audit: audit_backlog=65 > audit_backlog_limit=64 [ 754.680238] audit: backlog limit exceeded [ 754.687000] audit: audit_backlog=65 > audit_backlog_limit=64 15:57:31 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 756.489705] bond88 (uninitialized): Released all slaves 15:57:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000008c0)=ANY=[@ANYBLOB="656e633d72617720456173683d67686173080000000000000000000000000000000000a673d378100b82ca0000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b020e9a7a51143313f83fe1ae71f6e89c3d537378812dd8a21d7393852abc5573d7522cff98492429651519fcac"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000980)='/dev/dlm\x80\x00\x00\x00itor\x00', 0x121000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff7c, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x20, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0xfffffffffffffeaa, 0x2, [{0xfffffffffffffedb, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f, 0x4, 0x3}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCINQ(r11, 0x541b, &(0x7f0000000540)) r12 = socket$netlink(0x10, 0x3, 0xc) writev(r12, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r10, 0x0, r12, 0x0, 0x422000a7b, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000140)={0x8, 0x0, 0x10001, 0x7}) ioctl$DRM_IOCTL_AGP_FREE(r10, 0x40206435, &(0x7f0000000240)={0x81, r13, 0x10000, 0xffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = accept$packet(r15, 0x0, &(0x7f00000006c0)) getsockname$packet(r16, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r19 = socket$netlink(0x10, 0x3, 0xc) writev(r19, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r18, 0x0, r19, 0x0, 0x422000a7b, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r18, 0x8936, &(0x7f0000000580)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x32, r6}) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r17, @ANYBLOB="fe000000000061df0000000000000100626f6e64000000000c0002000800010004000000ae9bcb6db6d7eb4b71d190d651323f6b449aca9beaaab8d5adef3c36a71d983b824f051e5993a0e311a9fdabd0074fc76f1627f826df774025d5bd40cda146767df9812a6ab8f53ac6391c51f4f8c86a00f25b81b3ea99c0b6d40d9084a490619163c4288b0694ad1cbd324474c445f7813ddf99a3818a936c9e48c685ae30b182bbe61984e3994af35f46559d2da9c2dd9483d6d7209a7fdb65f973fbd38e"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x168, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x140, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x130, 0x2, [@tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x9}, @IFLA_IPTUN_TTL={0x8, 0x4, 0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r17}]}, 0x168}}, 0x0) [ 756.705168] kauditd_printk_skb: 170 callbacks suppressed [ 756.705301] audit: type=1400 audit(1576166251.723:1000): avc: denied { map } for pid=4338 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 756.802706] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:57:32 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="017755030000000000000500000001000000", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7401000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r10], 0x174}}, 0x0) [ 757.630809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 757.636913] audit: audit_lost=81 audit_rate_limit=0 audit_backlog_limit=64 [ 757.659611] audit: audit_backlog=65 > audit_backlog_limit=64 [ 757.681138] audit: audit_backlog=65 > audit_backlog_limit=64 [ 757.687268] audit: audit_lost=82 audit_rate_limit=0 audit_backlog_limit=64 [ 757.697225] audit: type=1400 audit(1576166251.763:1001): avc: denied { map } for pid=4326 comm="syz-executor.5" path="/dev/ashmem" dev="devtmpfs" ino=17423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 757.737672] audit: audit_backlog=65 > audit_backlog_limit=64 [ 757.775160] audit: audit_backlog=65 > audit_backlog_limit=64 [ 757.791300] audit: audit_lost=83 audit_rate_limit=0 audit_backlog_limit=64 [ 758.076979] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:57:33 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000780)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d636500000000000000000000000000000000001cb424004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000240)=0x4, 0x4) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vga_arbiter\x00', 0x4000, 0x0) sendto$netrom(r4, &(0x7f0000000800)="f4dbd4a244bbdc735463c0e9d8ed168288517da05f7c7c39ff5fbc940fb47b8b3f34363ef0dd8f17c70a1cc7c44002c480c2d6d179abb82ff9054e686fc1a00bc82e86d5e4c5f30069a908f013445986ced68d5af1cc3c20a338a02e61d699cfbd01c2bdd32b2c01083e34b98a5df33615acf976499cbdd3b72e5f1a6249316de8c4ec", 0x83, 0x80008d9, &(0x7f00000008c0)={{0x3, @bcast, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000540)={0x7fff, 0x1, 0x8, 'queue0\x00', 0x10000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$TEAM_CMD_OPTIONS_SET(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000940)=ANY=[@ANYBLOB="58000000e9247f2ed48a51d7fb857cf70e3d30f50f8e27d08973c2da2d1269a581bd2f84faae880092f4d7f5c48b5dc18e20a8870a4b0420a6fd52727815ddbe81b35aca76760b2136538cb4f5dfa6c8646834ed4d2912c9e42fdb9a5eed9fe6c342ccea0ad283fe6d2c8c9f5c7877c6c823b5fd830b2cb7f98567856f6341edb10ec5bd70587b1c9690a73c57255ebf0495eac53a6916626941927dd7fd15608cbb85aa173988ad6c2425fb42fa61f42bab8f607404b8c1f7a131f41736552dd8f4", @ANYRES16=r2, @ANYBLOB="018000000000000000000100000008000100", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x5}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x105800, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r13, 0x40a85321, &(0x7f0000000600)={{0x1}, 'port1\x00', 0x88, 0x20000, 0x1, 0x1, 0xfff, 0x1, 0xb6, 0x0, 0x1}) r14 = fcntl$getown(0xffffffffffffffff, 0x9) sched_getparam(r14, &(0x7f0000000740)) prctl$PR_GET_KEEPCAPS(0x7) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d80)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001e80)=0xe8) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7401000010001fff00"/20, @ANYRES32=r15, @ANYBLOB="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", @ANYRES32=r12], 0x174}}, 0x0) [ 759.013893] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 15:57:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xffb4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x2, 0x11, 0x4, 0x485, r3}, 0x10) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:57:34 executing program 1: mount(&(0x7f0000001340)=ANY=[@ANYBLOB="2e2f66696ce3b3"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20080, 0x8) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x800000000000000, 0xfffffffffffffe3a, 0x0, 0x380dc23, 0x0) 15:57:35 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 760.935751] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 761.346740] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 761.747604] kauditd_printk_skb: 244 callbacks suppressed [ 761.747613] audit: type=1400 audit(1576166256.763:1158): avc: denied { map } for pid=4399 comm="syz-executor.0" path="/dev/ashmem" dev="devtmpfs" ino=17423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 762.138465] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:57:37 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000600)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b612222e18ab01f102ac9d55b05b0e7d72ccffd71d53e11f4f760e74af3e144760a481ad01cd8a74be159592f263f6ea31acdf8937ae616673869b229c81d"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000140)={0x0, 0x2, 0xffffffff, 0x1ff, '\x00', 0xf0000000}) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f00000017c0)=0xe8) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r11) r12 = socket(0x10, 0x803, 0x0) r13 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000001640)={0x0, 0x0, 0x0}, &(0x7f0000001680)=0xc) sendmsg$unix(r12, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r14}}}], 0x20}, 0x0) r15 = getgid() r16 = getegid() fsetxattr$system_posix_acl(r0, &(0x7f0000000500)='system.posix_acl_access\x00', &(0x7f0000001800)={{}, {0x1, 0x2}, [{0x2, 0x4, r9}, {0x2, 0x4, r11}], {}, [{0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x1, r14}, {0x8, 0x5, r15}, {0x8, 0xe, r16}], {}, {0x20, 0x4}}, 0x54, 0x1) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r18, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000f3332940a4d22fc4cde907ddc040c9e54761751c8ae1aa6be7d68417a4a6e127e25100806b5ce8c850817788445f9cf263cecaebefa5205b18c65da707a41bb73071fc90dab6a8"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0xec, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xc4, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xb4, 0x2, [@IFLA_IPTUN_PROTO, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy, @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r18}]}, 0xec}}, 0x0) r19 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGREP(r19, 0x80084503, &(0x7f00000006c0)=""/4096) [ 762.520798] netlink: 312 bytes leftover after parsing attributes in process `syz-executor.0'. [ 762.720195] audit: type=1400 audit(1576166256.803:1159): avc: denied { map } for pid=4403 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:57:37 executing program 1: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$tipc2(0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x40000) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x5, 0x0, [{0xa96, 0x0, 0x1}, {0x357, 0x0, 0x7}, {0x560, 0x0, 0x9c57}, {0x11, 0x0, 0xfffffffffffffffc}, {0x3b3, 0x0, 0x2}]}) syz_open_procfs(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000200)="0f20d835080000000f22d8260f01da0fc79f74f600000f01990a000000ea200000000600f466baf80cb8983dda8def66bafc0c66b8005066ef66bad10466b8000066efc4c13dd21766b82a010f00d0", 0x4f}], 0x4988446775dd865, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r4, 0x227c, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f00000001c0)={0x8, 0x8, 0x20}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 763.006749] sp1: Synchronizing with TNC 15:57:38 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c}}]}, 0x16}}, 0x4000040) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 763.412255] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 763.516881] audit: audit_backlog=65 > audit_backlog_limit=64 [ 763.584514] audit: audit_backlog=65 > audit_backlog_limit=64 [ 763.620536] audit: audit_backlog=65 > audit_backlog_limit=64 [ 763.623437] audit: type=1400 audit(1576166256.803:1160): avc: denied { map } for pid=4403 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:57:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000340)={0xbb, "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"}) 15:57:38 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 763.825572] audit: audit_lost=113 audit_rate_limit=0 audit_backlog_limit=64 [ 764.086126] audit: audit_backlog=65 > audit_backlog_limit=64 [ 764.092082] audit: audit_lost=114 audit_rate_limit=0 audit_backlog_limit=64 [ 764.099185] audit: backlog limit exceeded 15:57:39 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) gettid() ioprio_get$pid(0x3, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000580)='/dev/snd/pcmC#D#c\x00', 0x1b3, 0x80000) shmget(0x2, 0x1000, 0x78000100, &(0x7f000096d000/0x1000)=nil) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000100)={'veth1_to_bridge\x00', 0x2}) r4 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r4, &(0x7f0000000040)={0x18, 0x2, {0x0, @remote}}, 0x1e) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r5, 0x127e, &(0x7f0000000080)) r6 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r7, 0x40505330, &(0x7f0000000040)) r8 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r8, 0x40505330, &(0x7f0000000040)) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r9, 0x40505330, &(0x7f0000000040)) r10 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r10, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r11 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r11, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r12, 0x40505330, &(0x7f0000000040)) write$tun(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[@ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESHEX=r6, @ANYRES32=r1, @ANYRESOCT=0x0, @ANYRES32, @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRESHEX=r10, @ANYPTR, @ANYRES16=r11, @ANYBLOB="75453f7d6b9db4321a49c6685cfa7953fba3cb995342a4ceaad0304254fa5d2c5e5cba27c5ad1f812444463019a7aaa9f84dee898ccc56e2c8ad7d39497525abb303fd492587a6638198ca202407b4fac8b9cd2723c8489ec9f2a00d5abefcc92c24b2c6ffa2a7959f19334aa474be011c57e0f0d5e9db5484e5205ed2a007f87c25244a9cc26978347dd940b007b0e7b1fd465ed8c70ba1063bef1811d319d5f82333dc18452437a32f4edd70bc91a04c44d71f26bd1cfef9b641c2f5fbf1a5f6c4f2d668db183a17387f3b83c202588788073dfcd5", @ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR, @ANYRES64=r0, @ANYRES16, @ANYRES64, @ANYBLOB="f364dec6a92126b89835de048714535d9a47c558216ff854ed907dafd662c360dd43c4e53977c1fd914cb9b1ac5ac5957f068709497985be0ddc218950f9e5abd9d73736415ea6b3397e485ad1ab2fafa97230064d7c1f7407a8b4b4f593ba61be1046457e7aa52966a3edee054563b47b831676a098cb7a3c33d1e64815d777dabcc394298129dc038343b307a0c1cac306079e"], @ANYRES64, @ANYRES32=0x0, @ANYRESOCT=r12]], @ANYRESOCT=r7, @ANYRESOCT=r8, @ANYRES32, @ANYRESHEX, @ANYRES64=r9, @ANYRESDEC=r5, @ANYRESHEX=r3], 0x8) connect$pptp(r4, &(0x7f0000000300)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) r13 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x100400, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000240)) fcntl$setflags(r1, 0x2, 0x0) r14 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) write$apparmor_exec(r16, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x16) ioctl$VIDIOC_G_PARM(r13, 0xc0cc5615, &(0x7f0000000480)={0x1, @capture={0x0, 0xbc157c2205694db8, {0x7, 0xff}, 0x6, 0x72b8}}) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f00000000c0)=0x63) setsockopt$IP_VS_SO_SET_ZERO(r14, 0x0, 0x48f, &(0x7f0000000340)={0x73, @initdev={0xac, 0x1e, 0x3, 0x0}, 0x4e24, 0x1, 'lblcr\x00', 0x8, 0x1, 0x56}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r13, 0x0, 0xfffffffffffffed5, 0xf6edfcc25085a2c9, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @loopback, 0xfffffffa}, 0x1c) 15:57:41 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x54c}}, 0x0) 15:57:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/eve\xe3\xe9#\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xc) writev(r4, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r3, 0x0, r4, 0x0, 0x422000a7b, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa, 0x4e22, 0x4, @loopback, 0x4b4}], 0x58) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 766.841632] kauditd_printk_skb: 155 callbacks suppressed [ 766.841667] audit: type=1400 audit(1576166261.863:1287): avc: denied { create } for pid=4443 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:57:42 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x48044, 0x0) setsockopt$llc_int(r10, 0x10c, 0x5, &(0x7f0000000240)=0xf9b, 0x4) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) 15:57:42 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 767.938046] sp1: Synchronizing with TNC [ 768.089678] audit: type=1400 audit(1576166261.863:1288): avc: denied { map } for pid=4443 comm="syz-executor.0" path="/dev/snd/seq" dev="devtmpfs" ino=17458 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 768.206327] IPVS: set_ctl: invalid protocol: 115 172.30.3.5:20004 [ 768.469597] IPVS: set_ctl: invalid protocol: 115 172.30.3.5:20004 15:57:44 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8001, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000300)={0x2, 'veth0\x00', {0x6}, 0x4}) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a0500000000000000422cb4963a160161b1cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x34d, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="05", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r2, r1, r2}, &(0x7f0000000240)=""/112, 0x2ae, &(0x7f0000000580)={&(0x7f0000000040)={'tgr160-generic\x00\x00\x00\xd4\x00\f5\x00'}}) io_setup(0x1, &(0x7f0000000080)) io_getevents(0x0, 0x6, 0x3, &(0x7f0000000440)=[{}, {}, {}], 0x0) request_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000004c0)='cpuset\x00', 0x0) [ 769.172808] audit: type=1400 audit(1576166261.903:1289): avc: denied { create } for pid=4443 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 769.798205] audit: audit_backlog=65 > audit_backlog_limit=64 [ 769.798510] audit: audit_backlog=65 > audit_backlog_limit=64 [ 769.806258] audit: audit_backlog=65 > audit_backlog_limit=64 [ 769.839460] audit: audit_backlog=65 > audit_backlog_limit=64 [ 769.878472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 769.936719] audit: audit_backlog=65 > audit_backlog_limit=64 [ 769.968053] audit: audit_lost=125 audit_rate_limit=0 audit_backlog_limit=64 15:57:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xffb4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r5}, 0x10) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f00000000c0)) 15:57:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_open_procfs$namespace(0x0, &(0x7f0000000800)='ns/pid\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r2, 0x0, 0x0, 0x4) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0], 0x1}) write$binfmt_elf64(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000980)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x1, 0x1000, 0x0, 0x4c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0x8001}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0xc08c5102, &(0x7f0000000040)) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in=@dev, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) r7 = socket(0x10, 0x803, 0x0) r8 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000001640)={0x0, 0x0, 0x0}, &(0x7f0000001680)=0xc) sendmsg$unix(r7, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r9}}}], 0x20}, 0x0) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000008c0)=0xe8) setxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000840)='sy\xfdY\xe5\xd5.posix_acl_abcess\x00\xb6\x81\xfe6t-\x9e\x84^&v\xec\xc8_m4\xf5\a\xc1\x8dz0&\xa468\xb3\a/L\x06f\xf6e\xccc|\x1b\xcf\xa77\x04\xf0\xd4\xaa\x8f\xc0+0\xd4\xa6C6\xa4\xe810\x8a\xbaE\xacR\x98qM\xef\x19\xca\x14\r|\xe3[k\xb7Y\xfd\x13o\x13\x1d\x00\n8\xe7\x1dP9\x19', &(0x7f00000006c0)={{}, {}, [{0x2, 0x4, r10}, {0x2, 0x1, r5}], {0x4, 0xff31a9f765da5bfa}, [{0x8, 0x4, r6}, {0x8, 0x7, r9}], {}, {0x20, 0x1}}, 0x44, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYRES32=0x0], &(0x7f000095dffc)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_DEL(r12, 0x0, 0x484, &(0x7f00000001c0)={0x3b, @remote, 0x4e22, 0x2, 'fo\x00', 0x6, 0xfdd, 0x26}, 0x2c) [ 771.964329] kauditd_printk_skb: 180 callbacks suppressed [ 771.964338] audit: type=1400 audit(1576166266.983:1423): avc: denied { map } for pid=4515 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 772.042004] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 772.180612] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:57:47 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:57:47 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:57:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r4, 0x40505330, &(0x7f0000000040)) r5 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r6 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r7, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r8 = dup2(r6, r7) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r8, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x1000}) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r9, 0x40505330, &(0x7f0000000040)) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vcs\x00', 0x8c39d1a9dd1b7af7, 0x0) r12 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r12, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r13 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r13, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000a00)=ANY=[@ANYBLOB="080000000000000071db002000000000060000000000008b", @ANYRES32=r5, @ANYBLOB="00000000f9ffffffffffffff00"/28, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r9, @ANYBLOB="000000000500"/28, @ANYRES32=r10, @ANYPTR=&(0x7f0000000ac0)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=r13], @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r11, @ANYRESOCT]) r14 = socket$nl_generic(0x10, 0x3, 0x10) r15 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r14, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r14, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r15, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r16, @ANYBLOB="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"], 0x58}}, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB='<\x00\x00\x00\x00\x00\x00', @ANYRES32=r20, @ANYBLOB="fe000000000000001c0012000c000100626f6e6400020008f7d5142d723824edefbd55000100040000000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$nl_route(r17, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000b00)=@newlink={0x11c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xf4, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xe4, 0x2, [@tunl6_policy=[@IFLA_IPTUN_REMOTE={0x0, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e23}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @IFLA_IPTUN_PROTO, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @IFLA_IPTUN_PROTO={0xffffff69}, @IFLA_IPTUN_PROTO, @IFLA_IPTUN_PROTO={0x457541bf8895bf8c}, @IFLA_IPTUN_PROTO, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r20}]}, 0x11c}, 0x1, 0x0, 0x0, 0x80}, 0x0) [ 772.860542] audit: type=1400 audit(1576166267.243:1424): avc: denied { map } for pid=4515 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:57:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000000)={0x4ce, 0x3}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r3, r2) bpf$MAP_CREATE(0x2, 0x0, 0x0) [ 773.715958] sp1: Synchronizing with TNC [ 773.834339] audit: type=1400 audit(1576166267.363:1425): avc: denied { map } for pid=4515 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 774.796970] audit: type=1400 audit(1576166267.403:1426): avc: denied { map } for pid=4530 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 775.066751] sp1: Synchronizing with TNC [ 775.522986] audit: audit_backlog=65 > audit_backlog_limit=64 [ 775.548069] audit: audit_backlog=65 > audit_backlog_limit=64 [ 775.684824] audit: audit_backlog=65 > audit_backlog_limit=64 [ 775.742108] audit: type=1400 audit(1576166267.403:1427): avc: denied { map } for pid=4530 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 775.780179] audit: audit_backlog=65 > audit_backlog_limit=64 15:57:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r4, 0xaead) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 775.798035] audit: audit_backlog=65 > audit_backlog_limit=64 15:57:50 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}, 0x15204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0xc) writev(r3, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r2, 0x0, r3, 0x0, 0x422000a7b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) accept4(r1, 0x0, &(0x7f0000000140), 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r7 = socket$netlink(0x10, 0x3, 0xc) writev(r7, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r6, 0x0, r7, 0x0, 0x422000a7b, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6}}, 0x0) open(&(0x7f0000000300)='./file0\x00', 0xd97df792d08763d6, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='sessionid\x00') socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r8, &(0x7f0000000100)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r8, &(0x7f0000000080)="030400306c00600000000000fff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0xfd82, 0x4000002, 0x0, 0x2ff) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) 15:57:51 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 777.019520] kauditd_printk_skb: 216 callbacks suppressed [ 777.019529] audit: type=1400 audit(1576166272.033:1500): avc: denied { map } for pid=4570 comm="ps" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 777.324415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 777.464653] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.0'. 15:57:52 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) r11 = dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r11, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r10, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r11, 0x84, 0x72, &(0x7f000059aff8)={r12}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000540)={r12, @in6={{0xa, 0x4e20, 0x80000000, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}, 0xe0d}}, 0x1f, 0x1ff}, 0x90) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r14, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r14}]}, 0x174}}, 0x0) 15:57:52 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000200)={0x7, 0x6d, 0x1}, 0x7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x1c}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$LOOP_SET_CAPACITY(r4, 0x4c07) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4cc], 0x100000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 15:57:53 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x2010, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 778.180120] audit: type=1400 audit(1576166271.933:1499): avc: denied { map } for pid=4563 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.854015] audit: type=1400 audit(1576166272.103:1501): avc: denied { map } for pid=4570 comm="ps" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:57:54 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 779.819240] sp1: Synchronizing with TNC [ 779.881168] audit: type=1400 audit(1576166272.373:1502): avc: denied { map } for pid=4574 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 780.293469] audit: audit_backlog=65 > audit_backlog_limit=64 [ 780.341301] audit: audit_backlog=65 > audit_backlog_limit=64 [ 780.344969] audit: audit_backlog=65 > audit_backlog_limit=64 [ 780.390116] protocol 88fb is buggy, dev hsr_slave_0 [ 780.395341] protocol 88fb is buggy, dev hsr_slave_1 [ 780.469069] audit: audit_backlog=65 > audit_backlog_limit=64 [ 780.557776] audit: audit_backlog=65 > audit_backlog_limit=64 [ 780.587224] audit: audit_lost=193 audit_rate_limit=0 audit_backlog_limit=64 15:57:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001440)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r3, 0x890b, &(0x7f0000001480)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6, [@null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0xfffffffffffffec0, 0x2, 0x0, 0x0, 0x9, 0x20}, 0x0) process_vm_readv(r4, &(0x7f0000000200)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000040)=""/58, 0x3a}, {&(0x7f0000000080)=""/164, 0xa4}, {&(0x7f0000000140)=""/178, 0xb2}], 0x4, &(0x7f0000001400)=[{&(0x7f0000000280)=""/98, 0x62}, {&(0x7f0000001340)=""/134, 0x86}], 0x2, 0x0) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r8, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 781.030161] protocol 88fb is buggy, dev hsr_slave_0 [ 781.035322] protocol 88fb is buggy, dev hsr_slave_1 [ 781.040672] protocol 88fb is buggy, dev hsr_slave_0 [ 781.045790] protocol 88fb is buggy, dev hsr_slave_1 [ 781.050985] protocol 88fb is buggy, dev hsr_slave_0 [ 781.056228] protocol 88fb is buggy, dev hsr_slave_1 [ 781.670139] protocol 88fb is buggy, dev hsr_slave_0 [ 781.675296] protocol 88fb is buggy, dev hsr_slave_1 [ 782.071163] kauditd_printk_skb: 123 callbacks suppressed [ 782.071171] audit: type=1400 audit(1576166277.093:1605): avc: denied { map } for pid=4617 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:57:57 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r6, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f018000006f756e74000000000000000000000000000008000300030000000f02040000000000"], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:57:57 executing program 4: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) bind$inet6(r0, &(0x7f00000031c0)={0xa, 0x0, 0x0, @local}, 0x1c) [ 782.995175] audit: type=1400 audit(1576166277.093:1606): avc: denied { map } for pid=4625 comm="syz-executor.0" path="/dev/ashmem" dev="devtmpfs" ino=17423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 15:57:58 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x200802) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{0x0, 0xfe}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r11, 0xc0845657, &(0x7f0000000500)={0x0, @reserved}) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000140)=0x7e) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r13 = socket$netlink(0x10, 0x3, 0xc) writev(r13, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r14 = syz_open_dev$video(&(0x7f0000000680)='/dev/video#\x00', 0x8, 0x290000) splice(r12, 0x0, r14, 0x0, 0x422000a7b, 0x0) getsockopt$inet_mreqn(r12, 0x0, 0x24, &(0x7f0000002d40)={@multicast1, @multicast1}, &(0x7f0000002d80)=0xc) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002dc0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_IFNAME={0x14, 0x3, 'bpq0\x00'}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x3c}}, 0x0) r15 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r15, 0x40505330, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r15, 0x40a85321, &(0x7f00000005c0)={{0xff, 0x6}, 'port1\x00', 0x13, 0x34081d, 0xa9b, 0x1, 0x800, 0x3, 0x3, 0x0, 0xfff2d2a852a1d831, 0xfffffff7}) 15:57:58 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:57:59 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000300)=""/191, 0x1a, 0xbf, 0x8}, 0x20) [ 784.097069] audit: type=1400 audit(1576166277.143:1607): avc: denied { create } for pid=4625 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 784.440458] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.446401] audit: audit_lost=202 audit_rate_limit=0 audit_backlog_limit=64 [ 784.456135] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.474215] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.655136] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.727292] sp1: Synchronizing with TNC [ 784.770128] audit: audit_lost=203 audit_rate_limit=0 audit_backlog_limit=64 [ 784.777268] audit: backlog limit exceeded [ 786.918742] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:58:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xffb4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000040), 0x4) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) 15:58:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0xffffff94, {}, {}, @quote}], 0xff33) [ 787.128525] kauditd_printk_skb: 141 callbacks suppressed [ 787.128535] audit: type=1400 audit(1576166282.143:1735): avc: denied { write } for pid=4671 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 15:58:02 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x138, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x110, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x100, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x138}}, 0x0) 15:58:03 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 788.100169] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 788.183793] audit: type=1400 audit(1576166282.263:1736): avc: denied { map } for pid=4677 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) open(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() tkill(r3, 0x9) syz_open_procfs(0x0, 0x0) dup2(r1, r2) syz_open_procfs(0x0, 0x0) 15:58:04 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000140)=0x5) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') r7 = dup(0xffffffffffffffff) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r9 = socket$netlink(0x10, 0x3, 0xc) writev(r9, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r8, 0x0, r9, 0x0, 0x422000a7b, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="ff7f00"/20, @ANYRES32=r13, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r13}]}, 0x174}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000540)={'team0\x00', r13}) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f00000005c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', r14}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x20, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r15}, {0x4}}]}, 0x20}}, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r19, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r16, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x128, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x100, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xf0, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x7}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x1}]]}}}, @IFLA_MASTER={0x8, 0xa, r19}]}, 0x128}}, 0x0) [ 789.240096] audit: type=1400 audit(1576166282.363:1737): avc: denied { map } for pid=4679 comm="grep" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 789.857742] audit: audit_backlog=65 > audit_backlog_limit=64 [ 789.872278] audit: audit_backlog=65 > audit_backlog_limit=64 [ 789.878128] audit: audit_lost=209 audit_rate_limit=0 audit_backlog_limit=64 [ 789.922788] audit: audit_backlog=65 > audit_backlog_limit=64 [ 789.926923] audit: audit_backlog=65 > audit_backlog_limit=64 [ 789.928626] audit: audit_lost=210 audit_rate_limit=0 audit_backlog_limit=64 [ 790.095355] audit: type=1400 audit(1576166282.383:1738): avc: denied { map } for pid=4671 comm="syz-executor.0" path="/dev/ashmem" dev="devtmpfs" ino=17423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 790.745259] sp1: Synchronizing with TNC 15:58:06 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f0000000040)) [ 791.737321] bond93 (uninitialized): Released all slaves [ 791.820962] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 792.272975] kauditd_printk_skb: 220 callbacks suppressed [ 792.272983] audit: type=1400 audit(1576166287.293:1836): avc: denied { map } for pid=4733 comm="net.agent" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:07 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 792.513196] sp1: Synchronizing with TNC 15:58:07 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp1\x00', 0x6100, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x3c}}, 0x0) 15:58:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000180)}], 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x134}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000180)=0x1) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0x35}, {0x0}, {&(0x7f0000000140)=""/62, 0x156}], 0x3, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 792.886160] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.0 [ 793.440094] audit: type=1400 audit(1576166287.293:1837): avc: denied { map } for pid=4733 comm="net.agent" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:08 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00', 0x60}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fadvise64(r3, 0x0, 0x0, 0x3) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000000540)=""/102) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r7, @ANYBLOB="3c00020038000100240001006d636173745f72616a6f696e5f636f696540a2000000000000000000000000000800030016bcdee50bef88da00000000"], 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x174}}, 0x0) [ 794.260095] audit: type=1400 audit(1576166287.293:1838): avc: denied { map } for pid=4733 comm="net.agent" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_dccp_buf(r8, 0x21, 0x17, &(0x7f00000000c0)="28b936dfec87d1f1a08c18dcd34214313fe520201ba77af6665f3aed7e4d907dfeda26836cfa9cd8d85d7aa4adf6ae04aee942c69349281dabb25a8ee4b20b917033acd3", 0x44) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[], &(0x7f0000a8a000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x72, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x1ff, 0x20, 0x5, 0x1ff}, &(0x7f0000000080)=0x18) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r12, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 795.261278] audit: type=1400 audit(1576166287.293:1839): avc: denied { map } for pid=4733 comm="net.agent" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x20, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_IOCTL(r0, &(0x7f0000000180)={0x20}, 0x20) [ 795.890395] audit: audit_backlog=65 > audit_backlog_limit=64 [ 795.896254] audit: audit_lost=252 audit_rate_limit=0 audit_backlog_limit=64 [ 795.952444] audit: audit_backlog=65 > audit_backlog_limit=64 15:58:11 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 796.068394] audit: audit_backlog=65 > audit_backlog_limit=64 [ 796.196910] audit: audit_backlog=65 > audit_backlog_limit=64 [ 796.233676] audit: audit_backlog=65 > audit_backlog_limit=64 15:58:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="83d7a3ff15b0d7f5a17bb13924e423b0ab6f58e8fbac86997c087e2d15a9216c1e420115689de0b7b09fcfb17a324f4dbdcbfdb554031814d0ff58c028bc4587dfa7b63726f25b9aedb1cad5f4460cdb22a086167f9a8ea0b95552c19bfe01c2f26f9ba3b97d308156da99", @ANYRES16, @ANYBLOB="01"], 0x3}}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 797.159774] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 797.285178] kauditd_printk_skb: 107 callbacks suppressed [ 797.285185] audit: type=1400 audit(1576166292.303:1939): avc: denied { map } for pid=4788 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:12 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r7 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x80000000, 0x80000) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r7, 0xc1105517, &(0x7f0000000740)={{0x0, 0x5, 0x57, 0x7, '\x00', 0xdb49}, 0x3, 0x30, 0x80000000, r8, 0x6, 0xffff, 'syz0\x00', &(0x7f0000000540)=['/dev/dlm-monitor\x00', '/dev/snd/seq\x00', 'em0[user]\x00', 'md5sumwlan1\x00', '{[user(vmnet1-\\cpuset\'#wlan1cpuset.,em0]\x00', 'vboxnet1\x00'], 0x66, [], [0x1f, 0xce, 0x1, 0x7f]}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) [ 798.270085] audit: type=1400 audit(1576166292.273:1937): avc: denied { map } for pid=4780 comm="net.agent" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 798.297069] bond664 (uninitialized): Released all slaves 15:58:13 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) ioctl$sock_SIOCETHTOOL(r11, 0x8946, &(0x7f0000000140)={'veth0_to_bridge\x00', &(0x7f0000000540)=@ethtool_regs={0x4, 0x7, 0xe9, "53a6baf0d159a090aee5e7466ae788200391408ce40cfe85c50c19a93a9018dcdcea4a8853b101c335e7384bd368095bea61f1d75e72e31bf72c71cf2f006dd4d24143e6b5817b5df9be6e3b32de51143ff7e3a67d40cd0eb73cc3031a8817ebb70e84f12f03f676acb9184be6947694bd99792400775a260812fccb2e781d17d6efa0d6566305f7c459bd63af2f3e40fdcd92e8954e8010378d18c155f596d294ae6c0455a2f546ed0d044ce8cfc08ba5d26b8c8d7d65b902714c14a73cc9d4ae7498055b29341f2cdd0b9524334a17fc394d5be4f145af0c63ef85167f3a25f18a27f1ab888f1e3f"}}) [ 798.910575] sp1: Synchronizing with TNC [ 799.500314] audit: type=1400 audit(1576166292.363:1941): avc: denied { map } for pid=4780 comm="net.agent" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.610259] audit: audit_backlog=65 > audit_backlog_limit=64 [ 799.672740] audit: audit_backlog=65 > audit_backlog_limit=64 [ 799.733494] audit: audit_backlog=65 > audit_backlog_limit=64 [ 799.757658] audit: audit_backlog=65 > audit_backlog_limit=64 15:58:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000ba004b83bbb6a23b4b6942b7871001000000000000002560b700ff"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)=ANY=[@ANYBLOB="ad000000020000008f0400"]) [ 799.857158] audit: audit_backlog=65 > audit_backlog_limit=64 [ 799.969935] sp1: Synchronizing with TNC [ 799.984485] audit: audit_lost=257 audit_rate_limit=0 audit_backlog_limit=64 [ 800.073155] audit: audit_lost=258 audit_rate_limit=0 audit_backlog_limit=64 15:58:15 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:58:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000), 0xed0e65d52ffd7c, 0x2028000) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/122, 0x7a}], 0x1}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 15:58:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x1) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 802.354158] kauditd_printk_skb: 164 callbacks suppressed [ 802.354167] audit: type=1400 audit(1576166297.373:2064): avc: denied { create } for pid=4829 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 803.077343] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 803.453681] audit: type=1400 audit(1576166297.373:2065): avc: denied { map } for pid=4829 comm="syz-executor.5" path="/dev/ashmem" dev="devtmpfs" ino=17423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 15:58:18 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7401000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r10], 0x174}}, 0x0) 15:58:19 executing program 4: 15:58:19 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r11, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r12, 0x40505330, &(0x7f0000000040)) r13 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r13, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRES16=r11, @ANYRESOCT, @ANYRES16, @ANYBLOB="2743e90f1829ded39180e0e845681fc0be6b2686f49cac75bd8a548775", @ANYRESHEX=r12, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYRESOCT=r3], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESDEC=r4, @ANYRES16=r7, @ANYRESOCT=r13, @ANYPTR64], @ANYRESOCT=r3]], 0x3}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x144, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x11c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x10c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8000000b}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x6}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0xfffffffffffffe71}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8001}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @IFLA_IPTUN_PROTO={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x144}}, 0x0) [ 804.800803] audit: type=1400 audit(1576166297.373:2066): avc: denied { map } for pid=4831 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:20 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 805.105788] audit: audit_backlog=65 > audit_backlog_limit=64 [ 805.295295] audit: audit_backlog=65 > audit_backlog_limit=64 [ 805.356352] audit: audit_backlog=65 > audit_backlog_limit=64 [ 805.368689] audit: audit_backlog=65 > audit_backlog_limit=64 [ 805.490898] audit: audit_backlog=65 > audit_backlog_limit=64 [ 805.503236] audit: audit_lost=273 audit_rate_limit=0 audit_backlog_limit=64 15:58:20 executing program 1: [ 805.615606] audit: audit_backlog=65 > audit_backlog_limit=64 [ 806.085518] sp1: Synchronizing with TNC [ 807.420949] kauditd_printk_skb: 157 callbacks suppressed [ 807.420958] audit: type=1400 audit(1576166302.443:2168): avc: denied { map } for pid=4880 comm="syz-executor.5" path="/dev/snd/seq" dev="devtmpfs" ino=17458 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 15:58:23 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg(r0, &(0x7f00000000c0)={0x0, 0xfffffdc4, &(0x7f0000000040), 0xc5020e3a8c1e2f3, 0x0, 0x227}, 0x0) [ 808.603309] audit: type=1400 audit(1576166302.523:2169): avc: denied { map } for pid=4882 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0xf) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 809.024412] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.0'. 15:58:24 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) syz_mount_image$xfs(&(0x7f0000000680)='xfs\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x6, &(0x7f0000000b80)=[{&(0x7f0000000780)="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", 0xfa, 0x80000001}, {&(0x7f0000000880)="7ae68dade98dd4403ba3fd98d6ed68de4ddf997200021103980e03ef4047789c5907987e180ccd6223a5aaf130", 0x2d, 0x80}, {&(0x7f00000008c0)="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", 0xfd, 0x3}, {&(0x7f00000009c0)="8c6e899e8f39040335eb661e68f5cb0c93215e6f387f69ce90abeec2d95ef970029fb63c62715b05f6c318c368b34597ff2838f71a35853fd8484eb5c83c9bcb4cbb369823773aa4a189b2f9a10cde25b3721070b10da97cf7bd5778ca9ac46846495bbf7126dcf2b0ea0fbaebbbf4b11e4a45e19165a8395a2325d848d1663351a8b01429bd922208c7e332d32128cf0e1e9c92676d2d2a87ebc9d2e215a8d895f940cb1fb21d24c1f4aba64294d69605e4c39dbdac8cec36e7f319d4d22034538b9ba112ae5b8bd3c8ffe9e3776cacf828d41c56aa5a8811cb06479ad08d90c5dde1f7", 0xe4, 0x9}, {&(0x7f0000000ac0)="96e351fcad5765aae484b04ccbc31c220ef5b86657ec602f3ce88ebe4ce77b7b4440b3de9d9755faf7651c6211a3d6a1d52df43795b323aab79db265f77b7939c3031401f709d98c1f1baf50f477f7c62ac701", 0x53, 0xdda}, {&(0x7f0000000b40)="bef1551b17ebe145bd7cb5e3875d1ad1e1128621212ab1696a889c3682", 0x1d, 0x7}], 0x49000, &(0x7f0000000c40)={[{@allocsize={'allocsize', 0x3d, [0x2d]}}], [{@audit='audit'}, {@dont_appraise='dont_appraise'}]}) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r11, 0x40505330, &(0x7f0000000040)) r12 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r12, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) perf_event_open(&(0x7f0000000cc0)={0x2, 0x70, 0x6, 0xc2, 0x1f, 0xff, 0x0, 0xa277, 0x100, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000c80), 0x10}, 0x140, 0x2, 0x6, 0x1, 0x20, 0x9}, 0xffffffffffffffff, 0x2, r7, 0x3) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRESDEC=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES64=0x0, @ANYPTR64, @ANYRES32=r11, @ANYRES16=r12, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="82638bd435491ad9632a581d0810b612512c9c36b92c834a5d7b10faef7c9ffde67d4edce086abf24d35e56b1f67de2190ec33c4465aefcbc4047047ab2b8475c9617eb5cb96bc09970ecea3cfb491f5d08c9b9735c19f1db3953c3c4df56e5589269201445753de23b408162b2a3bc30844c41e496dfce27a9983774ed67baaba081222d6f49e55bf672f8b960fcf4510a9ef52bc16e9097f9e01edc390549244a12882774cb82a074a180c476c79dbdde9a3c70dd652ae47d49b4b528bacf06dcad919f27860c235bf21893d0b489cf185149940", @ANYBLOB="a58ce0295f8926d01b478ac450c1e7c4986d958d15c9925429ac"]], @ANYRES64=r7], 0x3}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) [ 809.555367] audit: audit_backlog=65 > audit_backlog_limit=64 [ 809.659942] audit: type=1400 audit(1576166302.533:2170): avc: denied { create } for pid=4880 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 809.666347] audit: audit_backlog=65 > audit_backlog_limit=64 [ 809.746008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 809.766838] audit: audit_backlog=65 > audit_backlog_limit=64 [ 809.884613] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.0'. [ 809.948000] audit: audit_lost=294 audit_rate_limit=0 audit_backlog_limit=64 [ 809.982047] audit: audit_lost=295 audit_rate_limit=0 audit_backlog_limit=64 15:58:25 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x10102) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x68309b81f7126227, &(0x7f0000000140)=0x4, 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) mount$9p_unix(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='9p\x00', 0x4000, &(0x7f0000000340)={'trans=unix,', {[{@cachetag={'cachetag', 0x3d, 'proc'}}, {@access_user='access=user'}, {@version_9p2000='version=9p2000'}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '\\mime_type+selinux\'cgroup*'}}, {@obj_user={'obj_user', 0x3d, '/dev/admmidi#\x00'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type'}}]}}) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYBLOB="a74611b1fb808bb877ddeb9b2921"], 0x2}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x8531, 0x511800) ioctl$TIOCSIG(r0, 0x40045436, 0xa) mkdirat(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000040)) ftruncate(r2, 0xfffffffffffffffd) r3 = semget$private(0x0, 0x8, 0x0) semctl$GETZCNT(r3, 0x0, 0xf, &(0x7f0000000600)=""/4096) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) creat(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000100)) 15:58:25 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 810.249684] audit: backlog limit exceeded [ 810.292846] audit: backlog limit exceeded 15:58:25 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x8}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x0, 0x40400) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x100, 0x2) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) rmdir(0x0) sched_setattr(0x0, 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x4, 0x3f, 0x0, 0x0, 0x0, 0xcf06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x1671}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x3, 0x2) r8 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r8, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) socket(0xa, 0x1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f'}) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f00000002c0)={@remote}) getsockopt$IP_VS_SO_GET_SERVICES(r7, 0x0, 0x482, &(0x7f00000014c0)=""/189, &(0x7f0000000100)=0xbd) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r9 = creat(&(0x7f0000000580)='./bus\x00', 0x0) write(r9, 0x0, 0x0) r10 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) socket$l2tp(0x18, 0x1, 0x1) dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 812.475319] kauditd_printk_skb: 100 callbacks suppressed [ 812.475328] audit: type=1400 audit(1576166307.493:2260): avc: denied { map } for pid=4923 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x51c, 0x1a0}]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000000c0)={0x2, 0x1f, [{0xffffffe0, 0x0, 0xd84}, {0x8, 0x0, 0x1}]}) [ 813.195051] sp1: Synchronizing with TNC [ 813.499899] audit: type=1400 audit(1576166307.523:2261): avc: denied { map } for pid=4912 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:29 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @empty}, &(0x7f0000000240)=0x10) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000540), &(0x7f0000000580)=0x4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r3, 0xab2ee000) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) socketpair(0xc0c906e0c0086d88, 0x2, 0x3f, &(0x7f00000005c0)) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$CAN_RAW_ERR_FILTER(r12, 0x65, 0x2, &(0x7f0000000600), 0x4) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r13, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x158, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x130, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x120, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r13}]}, 0x158}}, 0x80) [ 814.539904] audit: audit_backlog=65 > audit_backlog_limit=64 [ 814.561060] audit: audit_backlog=65 > audit_backlog_limit=64 [ 814.730060] audit: audit_lost=300 audit_rate_limit=0 audit_backlog_limit=64 [ 814.737208] audit: backlog limit exceeded [ 814.766102] audit: audit_backlog=65 > audit_backlog_limit=64 [ 814.772580] audit: audit_backlog=65 > audit_backlog_limit=64 [ 814.778515] audit: audit_lost=301 audit_rate_limit=0 audit_backlog_limit=64 [ 814.838160] audit: type=1400 audit(1576166307.533:2262): avc: denied { map } for pid=4911 comm="ps" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:30 executing program 0: syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000180)={{0x23}, 'port0\x00', 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}) ioctl$int_in(r0, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1008800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff0180c289030086dd6076605100303afffe80034380050dff000200000000000000000000000000018600907800070300000000180300000500000111050000000000fce4d2a6f450cb00"/94], 0x0) prctl$PR_GET_ENDIAN(0x13, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) mount(&(0x7f00000001c0)=@sr0='/dev/sr0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='cpuset\x00', 0x10000, &(0x7f00000002c0)='eth1:keyring)-%posix_acl_access\x00') mknodat(0xffffffffffffffff, 0x0, 0x40, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0xfffffd3d) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000340)=@req={0x100, 0x3f, 0x1000, 0x8}, 0x10) socket$inet6(0xa, 0x0, 0x84) pipe(&(0x7f0000000280)) r2 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffe57}], 0x0, 0x0, 0xfa, 0xa00}, 0x20010030) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='children\x00') 15:58:30 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) 15:58:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x80}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r5) io_setup(0x3d8, &(0x7f00000004c0)) io_submit(0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000140)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) r6 = socket$inet6(0xa, 0x2, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) connect$inet6(r6, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x1) setrlimit(0x2, &(0x7f00000011c0)={0x5f8, 0x3}) sendmmsg(r6, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) close(r0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)=0x7) [ 817.556840] kauditd_printk_skb: 184 callbacks suppressed [ 817.556849] audit: type=1400 audit(1576166312.573:2343): avc: denied { map } for pid=4964 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:32 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x141000, 0x0) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x5, 0x80, 0x8, 0x3f, 0x48, 0x3}}, 0x8) syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@resize={'resize'}}]}) [ 818.770259] audit: type=1400 audit(1576166312.613:2344): avc: denied { map } for pid=4964 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 818.849832] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:58:34 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) [ 819.665435] audit: audit_backlog=65 > audit_backlog_limit=64 [ 819.706457] audit: audit_backlog=65 > audit_backlog_limit=64 15:58:35 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=""/58, &(0x7f0000000240)=0x3a) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r11, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r11) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x15c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x134, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x124, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x26}}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @dev={0xfe, 0x80, [], 0x17}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xc}], @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0xfe}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x4}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x15c}}, 0x0) [ 819.971650] audit: audit_backlog=65 > audit_backlog_limit=64 [ 819.977758] audit: audit_lost=337 audit_rate_limit=0 audit_backlog_limit=64 [ 820.012354] audit: audit_backlog=65 > audit_backlog_limit=64 [ 820.018392] audit: audit_lost=338 audit_rate_limit=0 audit_backlog_limit=64 [ 820.107175] audit: audit_lost=339 audit_rate_limit=0 audit_backlog_limit=64 [ 820.140218] audit: audit_lost=340 audit_rate_limit=0 audit_backlog_limit=64 15:58:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x100) ioctl$VT_RESIZEX(r5, 0x560a, &(0x7f0000000040)={0x7, 0x9fc, 0x0, 0xdf, 0x6, 0x3f}) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 820.557024] IPVS: ftp: loaded support on port[0] = 21 [ 822.170547] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 822.670969] kauditd_printk_skb: 148 callbacks suppressed [ 822.670977] audit: type=1400 audit(1576166317.693:2483): avc: denied { map } for pid=5020 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 823.791202] audit: type=1400 audit(1576166317.693:2484): avc: denied { map } for pid=5019 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 824.780169] audit: type=1400 audit(1576166317.843:2485): avc: denied { map } for pid=5018 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 825.302781] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 825.433127] sp1: Synchronizing with TNC [ 825.802894] audit: type=1400 audit(1576166317.903:2486): avc: denied { map } for pid=5020 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 826.956000] audit: type=1400 audit(1576166317.903:2487): avc: denied { map } for pid=5020 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 828.080109] audit: type=1400 audit(1576166317.903:2488): avc: denied { map } for pid=5020 comm="grep" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 828.950100] audit: type=1400 audit(1576166317.933:2489): avc: denied { map } for pid=5019 comm="ps" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 829.183635] audit: audit_backlog=65 > audit_backlog_limit=64 [ 829.484819] audit: audit_backlog=65 > audit_backlog_limit=64 [ 829.690148] audit: audit_lost=343 audit_rate_limit=0 audit_backlog_limit=64 [ 829.697289] audit: backlog limit exceeded [ 829.699786] audit: audit_backlog=65 > audit_backlog_limit=64 [ 829.869270] audit: audit_backlog=65 > audit_backlog_limit=64 [ 829.930099] audit: audit_lost=344 audit_rate_limit=0 audit_backlog_limit=64 [ 829.937339] audit: backlog limit exceeded [ 833.155992] kauditd_printk_skb: 117 callbacks suppressed [ 833.156000] audit: type=1400 audit(1576166328.173:2603): avc: denied { map } for pid=5051 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 834.200119] audit: type=1400 audit(1576166328.213:2604): avc: denied { map } for pid=5053 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 835.020186] audit: type=1400 audit(1576166328.213:2605): avc: denied { map } for pid=5053 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 835.970120] audit: type=1400 audit(1576166328.343:2606): avc: denied { map } for pid=5054 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 836.870175] audit: type=1400 audit(1576166328.343:2607): avc: denied { map } for pid=5054 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 837.800098] audit: type=1400 audit(1576166328.343:2608): avc: denied { map } for pid=5054 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 838.830125] audit: type=1400 audit(1576166328.423:2609): avc: denied { map } for pid=5050 comm="ps" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 839.820081] audit: type=1400 audit(1576166328.453:2610): avc: denied { map } for pid=5051 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 840.860215] audit: type=1400 audit(1576166328.613:2611): avc: denied { map } for pid=5053 comm="ps" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:56 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x10102) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x68309b81f7126227, &(0x7f0000000140)=0x4, 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) mount$9p_unix(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='9p\x00', 0x4000, &(0x7f0000000340)={'trans=unix,', {[{@cachetag={'cachetag', 0x3d, 'proc'}}, {@access_user='access=user'}, {@version_9p2000='version=9p2000'}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '\\mime_type+selinux\'cgroup*'}}, {@obj_user={'obj_user', 0x3d, '/dev/admmidi#\x00'}}, {@dont_hash='dont_hash'}, {@subj_type={'subj_type'}}]}}) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYBLOB="a74611b1fb808bb877ddeb9b2921"], 0x2}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x8531, 0x511800) ioctl$TIOCSIG(r0, 0x40045436, 0xa) mkdirat(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000040)) ftruncate(r2, 0xfffffffffffffffd) r3 = semget$private(0x0, 0x8, 0x0) semctl$GETZCNT(r3, 0x0, 0xf, &(0x7f0000000600)=""/4096) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) creat(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000100)) 15:58:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000400)='./bus\x00', 0x88) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r4 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\xeb', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r5 = getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r5, 0x12) r6 = openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000300), 0x12) creat(&(0x7f0000000340)='./bus\x00', 0x80) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r8 = creat(&(0x7f0000000440)='./file0\x00', 0x22) lseek(r8, 0x800002, 0x0) writev(r8, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) lseek(r8, 0x0, 0x3) ioctl$SNDRV_PCM_IOCTL_PREPARE(r8, 0x4140, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f00000001c0)) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000080)=0x808002) r9 = shmget$private(0x0, 0x2000, 0x40, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r9, 0x3, &(0x7f0000000200)=""/201) creat(&(0x7f0000000040)='./bus\x00', 0x0) r10 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r10, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x400}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000004c0)=0x20000) r11 = creat(&(0x7f0000000480)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r11, 0x40086602, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_NODELAY(r11, 0x84, 0x3, &(0x7f0000000100)=0x64000000, 0x4) r12 = socket(0x40000000015, 0x805, 0x0) getsockopt(r12, 0x114, 0x1000000002711, 0x0, &(0x7f00000000c0)) 15:58:56 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6(0xa, 0x800, 0x6d) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x6, 0x80) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) getsockopt$sock_cred(r0, 0x1, 0xe, &(0x7f0000001480), &(0x7f0000000180)=0xc) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000040)={0x2, 0x2, 0x9, 'queue1\x00', 0x1}) 15:58:56 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) 15:58:56 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000540)={0xe, 0x9, 0x7, 0x88, 0xbf, "4da068b1a1dc25341074c81b54dfb817d3e7e8e4fe2f48d933fd9fc4fd5479a019cf22fdba22c05edd6d77d3a7c8ae52bbf1f79fd674fac9c3bebdedb0126d8595fe2c10306df44fca53d8dccd7f066b65aba47cf9bb1224d255fb3090085d99b35470e80af27a0df2aaf2606b83d72fb32b5e87cd2cdc959a849e5065c0454e75c9b80b8c295a0437a329d3ca325909546f4a791fc12212cca77deecae5678a17eca1659b4f08832fcc5c7dd572e56367c89995624972e5c4d6aa233b03e8"}, 0xcb) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 15:58:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000040)={0x1, 0xab, "18cb5e6d12e7335dc302148fc0e1e207c7195be3b7c548f7c8292746bd84cb0cfa67d62eaffc02bbdf60d5ddc91625d9aa42f4b521b92fcd87af4567656f0cab77449221949d2eaca77555e212035c202691c3c4ad0cd24b664c7b7bc010545482d3c37e5d2a97480e769e297b052b81d5e7a63074f95f08e8c9367788a4f73aa13f3f015104509572ec4793ee5eb0f3f98b978a8077904676f3c688012cef88f36d2942e17f62fe226196"}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x7) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x480b75594570cc50, 0x0, 0x0, 0xfffffcc5) [ 841.888811] audit: type=1400 audit(1576166328.613:2612): avc: denied { map } for pid=5053 comm="ps" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.534982] sock: process `syz-executor.0' is using obsolete getsockopt SO_BSDCOMPAT 15:58:58 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=""/58, &(0x7f0000000240)=0x3a) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r11, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r11) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x15c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x134, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x124, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x26}}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @dev={0xfe, 0x80, [], 0x17}}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xc}], @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0xfe}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x4}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x15c}}, 0x0) [ 843.134653] bond97 (uninitialized): Released all slaves [ 843.203202] audit: type=1400 audit(1576166328.613:2613): avc: denied { map } for pid=5053 comm="ps" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:58:58 executing program 0 (fault-call:5 fault-nth:0): mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 843.468557] sp1: Synchronizing with TNC 15:58:58 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f0000000540)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f000000000000000000000000000000000000000000000000000000000000000000000019877c3ee9630004380bd737459de3fd662613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@newlink={0x190, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x168, 0x12, @ipip6={{0xc, 0x1, '\x00\x00\x00\x00]K\x80'}, {0x158, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_TOS={0x8, 0x5, 0x7f}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e22}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e24}, @IFLA_IPTUN_LINK={0x8, 0x2, r6}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x190}}, 0x0) 15:58:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[@ANYBLOB="894eaa1de43d9d1cfbe35427f8a053bfebfc7c58ee37b255450b7a8954e1aa6c8759e779bb5f126337596166000d8709b32b0302a1da252197dfe4323a6b1d5c843914a94629b5f4fb012b1548992e4253a970c7d9b290771234cf7999a51b5185b57b1750932e5e2d74c6164fb1aff295315db4930dc6c16f00d9fe4ab753d44faafdaebc750896bf0bc608"], 0x0, 0x8c}, 0x20) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000015000/0x1000)=nil) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3c021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) msgget(0x0, 0xd83a010980e6fbfd) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="d8db98"], 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x40000000003, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7f, 0x200], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r4 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) [ 844.380123] audit: type=1400 audit(1576166328.763:2614): avc: denied { map } for pid=5054 comm="grep" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 844.380144] audit: type=1400 audit(1576166328.763:2615): avc: denied { map } for pid=5054 comm="grep" path="/lib/x86_64-linux-gnu/libdl-2.13.so" dev="sda1" ino=2703 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 844.380161] audit: type=1400 audit(1576166328.763:2616): avc: denied { map } for pid=5054 comm="grep" path="/lib/x86_64-linux-gnu/libdl-2.13.so" dev="sda1" ino=2703 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 844.380178] audit: type=1400 audit(1576166329.033:2617): avc: denied { map } for pid=5053 comm="ps" path="/lib/x86_64-linux-gnu/libprocps.so.0.0.1" dev="sda1" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 844.380194] audit: type=1400 audit(1576166329.033:2618): avc: denied { map } for pid=5053 comm="ps" path="/lib/x86_64-linux-gnu/libprocps.so.0.0.1" dev="sda1" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 844.380211] audit: type=1400 audit(1576166329.143:2619): avc: denied { map } for pid=5054 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 844.380230] audit: type=1400 audit(1576166329.143:2620): avc: denied { map } for pid=5054 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:59:01 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0xffffffffffffff97) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x9, 0x200) ioctl$SOUND_MIXER_READ_RECMASK(r1, 0x80044dfd, &(0x7f0000000000)) [ 846.538972] audit: audit_backlog=65 > audit_backlog_limit=64 [ 846.740285] audit: audit_backlog=65 > audit_backlog_limit=64 [ 846.852771] audit: audit_lost=347 audit_rate_limit=0 audit_backlog_limit=64 [ 848.101427] FAULT_INJECTION: forcing a failure. [ 848.101427] name failslab, interval 1, probability 0, space 0, times 0 15:59:03 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[], 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f00000000c0)=@ethernet={0x6, @local}, 0x10a, &(0x7f0000000200), 0x1}, 0x20008844) close(r0) r3 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x200001) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000000)=0x44e80e4a) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r5 = socket$netlink(0x10, 0x3, 0xc) writev(r5, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x2bb}], 0x1) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcsa\x00', 0x20800, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000340)={0x40, 0x1, 0x2}, 0x10) splice(r4, 0x0, r5, 0x0, 0x422000a7b, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000140)={0x0, {0x0, 0x1c9c380}, 0xa97, 0x20}) [ 848.737878] CPU: 0 PID: 5115 Comm: syz-executor.0 Not tainted 4.14.158-syzkaller #0 [ 848.745715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.755092] Call Trace: [ 848.757785] dump_stack+0x142/0x197 [ 848.761451] should_fail.cold+0x10f/0x159 [ 848.765617] should_failslab+0xdb/0x130 [ 848.769601] kmem_cache_alloc+0x47/0x780 [ 848.773773] avc_alloc_node+0x27/0x4d0 [ 848.777675] ? trace_hardirqs_on_caller+0x400/0x590 [ 848.782699] avc_compute_av+0x185/0x570 [ 848.786678] avc_has_perm+0x345/0x4b0 [ 848.790487] ? avc_has_perm_noaudit+0x420/0x420 [ 848.795169] ? save_trace+0x290/0x290 [ 848.799066] ? find_held_lock+0x35/0x130 [ 848.803137] sock_has_perm+0x1e2/0x280 [ 848.807031] ? selinux_tun_dev_create+0xc0/0xc0 [ 848.811718] ? lock_downgrade+0x722/0x740 [ 848.815887] selinux_socket_setsockopt+0x43/0x80 [ 848.820661] security_socket_setsockopt+0x7d/0xb0 [ 848.825519] ? sockfd_lookup_light+0xb4/0x160 [ 848.830018] SyS_setsockopt+0xc6/0x210 [ 848.833909] ? SyS_recv+0x40/0x40 [ 848.837378] ? do_syscall_64+0x53/0x640 [ 848.841395] ? SyS_recv+0x40/0x40 [ 848.844859] do_syscall_64+0x1e8/0x640 [ 848.848750] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 848.853603] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 848.859065] RIP: 0033:0x45a909 [ 848.862275] RSP: 002b:00007f65a776fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 848.869992] RAX: ffffffffffffffda RBX: 00007f65a776fc90 RCX: 000000000045a909 [ 848.877291] RDX: 00000000000000d3 RSI: 0000000000000029 RDI: 0000000000000003 [ 848.884709] RBP: 000000000075bfc8 R08: 000000000000005c R09: 0000000000000000 [ 848.891983] R10: 0000000020ee5000 R11: 0000000000000246 R12: 00007f65a77706d4 [ 848.899354] R13: 00000000004d2248 R14: 00000000004e24d0 R15: 0000000000000005 [ 849.427649] audit_log_start: 153 callbacks suppressed [ 849.427657] audit: audit_backlog=65 > audit_backlog_limit=64 [ 849.522427] audit: audit_backlog=65 > audit_backlog_limit=64 [ 849.615443] audit: audit_backlog=65 > audit_backlog_limit=64 [ 849.703702] audit: audit_lost=399 audit_rate_limit=0 audit_backlog_limit=64 [ 849.837794] audit: audit_lost=400 audit_rate_limit=0 audit_backlog_limit=64 [ 849.852266] audit: audit_backlog=65 > audit_backlog_limit=64 [ 849.908616] audit: audit_lost=401 audit_rate_limit=0 audit_backlog_limit=64 [ 850.065349] audit: backlog limit exceeded [ 850.141901] audit: audit_backlog=65 > audit_backlog_limit=64 [ 850.162600] audit: backlog limit exceeded 15:59:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x6, 0x0) ioctl$KDGKBLED(r2, 0x80045104, 0x0) 15:59:08 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth0_to_bridge\x00'}, 0x18) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xec}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x401, 0x10000) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000300)={0x0, @capture={0x1000}}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)='2', 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r2 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x0) ioctl$int_out(r2, 0x2, &(0x7f00000000c0)) syz_open_dev$cec(&(0x7f0000000240)='\x00\x00\x00\x00c#\xc0\x00', 0x1, 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x2080, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @multicast2}}}, &(0x7f0000000680)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000006c0)={0xfa2, 0x303, 0x16, 0x4, r5}, &(0x7f0000000700)=0x10) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x1f, 0x88b, 0x0, 0x8, 0x4}, &(0x7f0000000440)=0x14) r6 = socket$inet_dccp(0x2, 0x6, 0x0) dup2(0xffffffffffffffff, r6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 854.621538] kauditd_printk_skb: 239 callbacks suppressed [ 854.621547] audit: type=1400 audit(1576166349.643:2714): avc: denied { map } for pid=5149 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 855.454490] audit: type=1400 audit(1576166349.753:2715): avc: denied { map } for pid=5148 comm="ps" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.471130] audit: type=1400 audit(1576166349.753:2716): avc: denied { map } for pid=5148 comm="ps" path="/lib/x86_64-linux-gnu/libprocps.so.0.0.1" dev="sda1" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.883898] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:59:12 executing program 4: mknod(&(0x7f00000005c0)='./bus\x00', 0x800b, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='sec \x00ity\x95ca\x00\x00fility\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x81, 0x4}, {0x8}]}, 0x14, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setuid(0xee01) execve(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 857.631647] audit: type=1400 audit(1576166349.763:2717): avc: denied { map } for pid=5149 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:59:12 executing program 0: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={r0}) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f00000003c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null}) r2 = socket$inet6(0xa, 0x3, 0x90) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 15:59:12 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='wchan\x00') sendfile(r0, r1, 0x0, 0xedc0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r3, 0x0, 0xedc0) dup2(r3, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r4 = getpid() sched_setattr(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x3cd37c41de8d14, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_SELECTION(r9, 0xc040563d, &(0x7f00000002c0)={0x0, 0x0, 0x101, 0x1, {0x3, 0x10001, 0xfffff482, 0x3}}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000140)={0x0, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x0, @remote}}}, 0x13149b49893fa1bd) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000640)={0x2, {{0x2, 0x0, @multicast1}}}, 0x108) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000100)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) 15:59:12 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f0000000140)={0x80000000, 0x7, 0x101, 0x1, 0x7, 0x1}) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c00020008000100040000005867005b7721ff50"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x0, 0x7, 0x5}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0xb, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x7}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4007}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="f58f8179fb8c44d5fa6e6548e9c8ba81"}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}, 0x1, 0x0, 0x0, 0x4088000}, 0x0) [ 858.969069] audit: type=1400 audit(1576166349.813:2718): avc: denied { map } for pid=5149 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:59:14 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x71) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000080)=0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = getegid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() r12 = getegid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0x1}, [{0x2, 0x3, r4}, {0x2, 0x4, r6}, {0x2, 0x5, r8}], {}, [{0x8, 0x1, r9}, {0x8, 0x3, r10}, {0x8, 0x2, r11}, {0x8, 0x0, r12}], {0x10, 0x1}, {0x20, 0x6}}, 0x5c, 0x3) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 860.202793] audit: type=1400 audit(1576166349.983:2719): avc: denied { map } for pid=5149 comm="grep" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:59:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) gettid() ioctl$SNDRV_PCM_IOCTL_START(r0, 0x4142, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000100)=0x3, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000080), 0x4) lseek(r0, 0x20400001, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) [ 861.374406] audit: type=1400 audit(1576166349.993:2720): avc: denied { map } for pid=5148 comm="ps" path="/lib/x86_64-linux-gnu/libprocps.so.0.0.1" dev="sda1" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 862.004316] bond97 (uninitialized): Released all slaves [ 862.012272] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 862.205526] netlink: 276 bytes leftover after parsing attributes in process `syz-executor.5'. 15:59:17 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000340)={&(0x7f0000000140)=[0xf15], 0x1, 0x15, 0xb3, 0x19671594, 0x3, 0x0, {0x20, 0x1f, 0x2, 0x80, 0x3, 0x81, 0x8, 0x1, 0x7, 0x101, 0xc, 0x400, 0x3f80000, 0x4, "49798d4e01675b382a0954d7085b137da368c859a9188fdef026438c70f8c307"}}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) socket$inet(0x2, 0x3, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') fcntl$notify(0xffffffffffffffff, 0x402, 0x0) io_submit(0x0, 0x2, &(0x7f0000000240)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x4, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffff400d, 0x0, 0x0, r3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x1000, 0xffffffffffffffff, &(0x7f00000001c0)="b7b017e2c5f9b37f274049944ad7fd002800589833a17405aad866c8b38acdee624fe22a6b13", 0x26, 0x5, 0x0, 0xe9a64f7d4dbfd05b}]) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup2(r6, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) recvmsg$kcm(r8, &(0x7f0000002640)={&(0x7f0000000040)=@can={0x1d, 0x0}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000140)}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000200)=""/242, 0xf2}, {&(0x7f0000000300)=""/55, 0x37}, {&(0x7f0000002bc0)=""/249, 0xf9}], 0x6, &(0x7f0000002540)=""/239, 0xef}, 0x2061) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000002680)={@empty, @mcast2, @mcast2, 0x4, 0x8, 0x20, 0x100, 0x9, 0x841803c7, r9}) sendmmsg$inet6(r1, &(0x7f0000001e00)=[{{&(0x7f0000000080)={0xa, 0x4e24, 0x2000000, @dev={0xfe, 0x80, [], 0x11}}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000440)="30779ab4eba28a9ca7a1ebeea17f74a5cf5e61e3707bfcf67c9bd9a886e896eca1d05867ab6eda63d66e84a1a9a9b91f54a4fde91189a779959372788995fb9fa911df5802f47b8d3f1c13c7d16c3fe28d699b27ec0cd2982b64ba38d2f621025711b1eed5276760d504da98386edf53df642a8378390fa80493f32c6abb96b6f2c0be648236383421c13c59369dc8fe19adb760bc4d0492", 0x98}, {&(0x7f00000003c0)="bf697e", 0x3}, {&(0x7f0000000500)="2fb9939a", 0x4}, {&(0x7f0000000540)="6393a97fcc97555761645c9027cdcfc5a89b75971d194807c7419d8bbd0b6c08a0e0699476232998eaef7ee35c474cd7d3334f69d77116a7178680dcbe818f9202119cc785fd192481916a8f404fd4a2727ef55b318ec24a4b9c0773bde7c6909fbf2417b6e2d3610e1ad4b318d51b9a39d8db0c19956033e7733c05ce3ab1b17302032cdd9eea29a3431832a59326", 0x8f}], 0x4, &(0x7f0000000640)=[@tclass={{0x14, 0x29, 0x43, 0x5}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x2, 0x2, 0x2, 0xa8, 0x0, [@dev={0xfe, 0x80, [], 0x14}]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x0, 0x2, [], [@hao={0xc9, 0x10, @local}, @ra={0x5, 0x2, 0x80}]}}}], 0x70}}, {{&(0x7f00000006c0)={0xa, 0x4e24, 0x0, @remote, 0x10001}, 0x1c, &(0x7f0000000980)=[{&(0x7f0000000700)="cfca044478fc4701a75898356ecc995f7ce4ea8a0e083a9686761526401547774e3990ccecfd162d54234000276ad2a1c129f674bdd97e95be5f4293f5e4e9ed26922b", 0x43}, {&(0x7f0000000780)}, {&(0x7f00000007c0)="2a3e8fd7ed810a06095935fd81536fcc42f92da21786f9ac3fc689f5e38185ee5ec4aea197efa13b3e2a8893811a924590eada8f1b947b59587d1161a55760ddeb017ec8178e03fc86376e2f212810b34155e2fa27341e46b94262ec4983885352c735bf85e07736024f", 0x6a}, {&(0x7f0000000840)="7bcad23d2fc6479d3be32fdc01a181652d9b3c5efd6fb5d2b4b2c64b2d2f235c46deeaf91888311733595998a19ec8ee2e29e851d97980b71a4a16bf7c5048a152f342f6678871aa25b26efb6223085c8494f0c8a87dcdd5955ccc764499d7eb74d197a2f842464d249c54f77129a622d00b03c658a390dc3d348321d1bc31a736e92476259712d959a8c9298acb799772b6049eb322f71f676227363a2f6ac2d57c4a01e13050955103403e3e7af739db890d944113db5a784346b0d14751f9a3eb0443c4c8dd5a2a8a33eace8d1b3d01e7299ae84c3fecabbc48281e25add73c747a26f3c8c066", 0xe8}, {&(0x7f0000000940)="688ed74e98b59f34dcd940d2780b", 0xe}], 0x5, &(0x7f0000000a00)=[@rthdrdstopts={{0x20, 0x29, 0x37, {0x2f, 0x0, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @rthdr_2292={{0x58, 0x29, 0x39, {0x0, 0x8, 0x2, 0x0, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}}}, @hopopts_2292={{0x38, 0x29, 0x36, {0x3c, 0x4, [], [@ra={0x5, 0x2, 0x400}, @ra={0x5, 0x2, 0xf000}, @pad1, @jumbo={0xc2, 0x4, 0x10000}, @enc_lim={0x4, 0x1, 0x2d}, @jumbo, @jumbo]}}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0x29, 0x3, [], [@hao={0xc9, 0x10, @remote}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x8}]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x1, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}]}}}, @hopopts={{0x20, 0x29, 0x36, {0x62, 0x0, [], [@ra={0x5, 0x2, 0x9}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r9}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x62, 0x2, 0x1, 0x4, 0x0, [@remote]}}}], 0x198}}, {{&(0x7f0000000bc0)={0xa, 0x4e21, 0x5, @remote, 0x6}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000000c00)="3b78322dfafa44b8ae00875cef4c8b1f9028e0973aaa070e2c11729439db66afbdf5bc8a4bbaf1120a8bb3ddbda4e2728d4bbe351e4203ae3eeb32c94010b983b1b5718ddbb2bcc9ed18a08de91630bb9f7c5a227b25c23b2bf9c27c71200eb9682ee63599d6c662ae1e47b98005973057573e596d5f7734781c0e7db8740fffad79ce7d7aa91c0aafc53ffd6c3129e923d58f3bb8c5631429d58efc3b12955cf3f83d3d4efa16ba4f2b255a49cf9e1793c64bac7f3c59e6c57dd2f940ed43", 0xbf}, {&(0x7f0000000cc0)="e957c7531547", 0x6}, {&(0x7f0000000d00)="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", 0x1000}, {&(0x7f0000001d00)="824b2bd85185f8e6b39bb9388808af635e852037b13747acabbe5fc023d998bebbf9b5cded0e68dc79e640f8e9e9ea56086dc7b3fe92f47b6f2e31e4a6e0131e7b3198a49b4ac76eeed11cff2e7442222baa8a12dbb7cba7408ba40c86899a126ac9aa7c7dae90dd2ef32a1c9368f65c6d1fb44002059acbdd3e717fa1330d28274a91708789bdcec0055a6d8c928f8eca710b014676a575949f903489cd73818197", 0xa2}], 0x4}}], 0x3, 0x40) connect$l2tp(r4, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(r2, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v1={0x1000000, [{0x1, 0x7ff}]}, 0xc, 0x22775fa20c72e4d1) sendmmsg(r4, &(0x7f0000005fc0), 0xa9, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r1) [ 862.763372] audit: type=1400 audit(1576166350.173:2721): avc: denied { map } for pid=5149 comm="grep" path="/lib/x86_64-linux-gnu/libdl-2.13.so" dev="sda1" ino=2703 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 862.793773] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 862.990688] audit: audit_backlog=65 > audit_backlog_limit=64 [ 863.055466] audit: audit_backlog=65 > audit_backlog_limit=64 [ 863.147968] audit: audit_backlog=65 > audit_backlog_limit=64 [ 863.188785] audit: audit_backlog=65 > audit_backlog_limit=64 [ 863.355364] audit: audit_lost=451 audit_rate_limit=0 audit_backlog_limit=64 [ 863.406398] audit: audit_lost=452 audit_rate_limit=0 audit_backlog_limit=64 [ 863.464421] audit: audit_backlog=65 > audit_backlog_limit=64 15:59:18 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x72, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000240)={r6, 0x3085}, &(0x7f0000000540)=0x8) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r8, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r9, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r10}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x100000000, 0x800) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r14, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r14}]}, 0x174}}, 0x0) 15:59:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="4effffef10001000"/20, @ANYRES32=0x0, @ANYBLOB="000000008000000008001f0038070000140012000c000100677265746170000004000200"], 0x3c}}, 0x0) [ 865.277325] kauditd_printk_skb: 166 callbacks suppressed [ 865.277334] audit: type=1400 audit(1576166360.293:2811): avc: denied { map } for pid=5203 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.482096] audit: type=1400 audit(1576166360.413:2812): avc: denied { map } for pid=5203 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 867.031908] net_ratelimit: 8 callbacks suppressed [ 867.031926] sctp: failed to load transform for md5: -2 [ 867.835790] audit: type=1400 audit(1576166360.513:2813): avc: denied { map } for pid=5212 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:59:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xffb4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000040)=0xffff7fff, 0x4) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 15:59:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev, 0x4}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x3]}, 0x5c) socket$inet6(0xa, 0x3, 0x40) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x0, [0x1, 0x0, 0x3]}, 0x5c) [ 868.855547] audit: type=1400 audit(1576166360.513:2814): avc: denied { map } for pid=5212 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:59:24 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$nl_crypto(r3, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x14040105}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)=@getstat={0xe0, 0x15, 0x300, 0x70bd2a, 0x25dfdbfe, {{'gcm-aes-ce\x00'}, [], [], 0x2000, 0x400}, ["", "", "", "", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x10}, 0x4001) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) 15:59:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000180)=[{}, {}, {}], 0x3, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0xb, 0x84) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@empty}, &(0x7f0000000040)=0x14) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r6 = socket$netlink(0x10, 0x3, 0xc) writev(r6, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r5, 0x0, r6, 0x0, 0x422000a7b, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r8 = socket$netlink(0x10, 0x3, 0xc) writev(r8, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r7, 0x0, r8, 0x0, 0x422000a7b, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) mq_notify(r5, &(0x7f00000001c0)={0x0, 0x1f, 0x3, @tid=r9}) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="35939e9902400000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x72, &(0x7f000059aff8)={r10}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r10, 0x7c1f, 0x0, 0x0, 0x80000000, 0x2}, 0x14) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) r11 = memfd_create(&(0x7f0000000500)='/dev\x8aT\xc0_\xb7#\x10\x16 audit_backlog_limit=64 [ 872.175439] audit: audit_backlog=65 > audit_backlog_limit=64 [ 872.185121] devpts: called with bogus options 15:59:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'tunl0\x00', 0x0}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f00000004c0)=0x54) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000040)={0x1f, r1}, 0xc) r3 = getpid() setpriority(0x2, r3, 0xfffffffeffffffff) close(r2) [ 872.391836] audit: audit_backlog=65 > audit_backlog_limit=64 [ 872.397684] audit: audit_lost=479 audit_rate_limit=0 audit_backlog_limit=64 [ 872.406464] audit: type=1400 audit(1576166361.043:2817): avc: denied { map } for pid=5212 comm="sh" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 872.473720] audit: audit_lost=480 audit_rate_limit=0 audit_backlog_limit=64 15:59:27 executing program 1: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcsa\x00', 0x105000, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f00000004c0)={0x0, 0x2, 0x6f, 0x81, 0x81}) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f00000006c0)='/dev/snd/controlC#\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc10c5541, &(0x7f0000000000)) r4 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[], 0xffb4) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r8, 0x110, 0x3) r9 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x5691f6daf5d0f2a8, 0x0) getpeername$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r9, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)=@newtclass={0xd8, 0x28, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, r10, {0x5, 0xffff}, {0x10, 0xfff0}, {0x3, 0xffe0}}, [@tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x5c, 0x2, [@TCA_CBQ_LSSOPT={0x18, 0x1, {0x2b, 0x3, 0x1d, 0x8, 0x3, 0x8000, 0x9, 0x3914}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x2d, 0x1, 0x1c, 0x5, 0xaa87, 0x3, 0x73, 0x20}}, @TCA_CBQ_RATE={0x10, 0x5, {0x2, 0x2, 0x3, 0x4, 0x5, 0x8}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0xe, 0x1, 0x1d, 0x7f, 0xd6, 0xffff8000, 0xffffff7f, 0x7}}]}}, @tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x14, 0x2, [@TCA_HFSC_FSC={0x10, 0x2, {0x9, 0x8, 0x9}}]}}, @tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x80}}}, @TCA_RATE={0x8, 0x5, {0x1f, 0x3f}}, @TCA_RATE={0x8, 0x5, {0x4, 0x7}}, @TCA_RATE={0x8, 0x5, {0x3, 0x3}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x200c8001}, 0x1) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r7, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r7, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 872.640119] audit: audit_lost=481 audit_rate_limit=0 audit_backlog_limit=64 15:59:27 executing program 0: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000000)=0x4, 0x4) r1 = socket$inet6(0xa, 0x3, 0x90) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) [ 872.970244] audit: backlog limit exceeded [ 872.980108] audit: backlog limit exceeded 15:59:28 executing program 4: chdir(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) pkey_alloc(0x0, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 15:59:30 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) pipe(0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000700), 0x2b2f496b7afd388, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe2(0x0, 0x84000) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000000600)=[{{&(0x7f0000000300)=@x25, 0x80, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/91, 0x5b}], 0x1, &(0x7f0000000500)=""/206, 0xce}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x4000000000141042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x24) open_by_handle_at(r6, 0x0, 0x0) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000200)="99245b2e6972731d959a35fdda251e35ceb8ee43918959f7dd7b24d017bea99bcdbbb8a6b67464cb73e2a641e8ca5f85c082b2f3692082a4a4ef49fe789ca3ca92403dc6143c6246066422fc8d18fe2d0a90e12cd6c49af49d10783a6e1a45bd59c6c6", 0x30837c0d}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r7, 0x28007d) openat$rfkill(0xffffffffffffff9c, 0x0, 0x2000, 0x0) sendfile(r7, r7, 0x0, 0x2008000fffffffe) 15:59:30 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d67686173682d63650000000000000000000000000000000000004f2f00000000000000000000000000000000000000000000000000000000000000000000000004380bd737609d9a6b881613957c9509d097ba3b287341e4441ace83d3b5db8f6b"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x6682, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r6, @ANYBLOB="3c00020038000100260001006d043b9b4be5c5f880636173745f5cf6c95808185b25e435e172656a6f696e5f636f756e7400"/60], 0x58}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r10, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x174}}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r11, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$KVM_SET_USER_MEMORY_REGION(r11, 0x4020ae46, &(0x7f0000000140)={0x1fd, 0x6, 0x4000, 0x1000, &(0x7f00006ff000/0x1000)=nil}) [ 876.302932] kauditd_printk_skb: 130 callbacks suppressed [ 876.302942] audit: type=1400 audit(1576166371.323:2923): avc: denied { map } for pid=5261 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 877.400085] audit: type=1400 audit(1576166371.323:2924): avc: denied { map } for pid=5261 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:59:32 executing program 1: syz_mount_image$hfs(&(0x7f0000012740)='hfs\x00', &(0x7f0000012780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="756d61736b5cbb24149e85947e291d5e301f473d3030303030303030303030303430303030"]) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x189f81, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000000c0)={r2, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) [ 878.643090] audit: type=1400 audit(1576166371.503:2925): avc: denied { map } for pid=5273 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 879.106140] overlayfs: failed to resolve './file1': -2 15:59:34 executing program 0: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev, 0xeaf0}}, 0x5c) r1 = socket$inet6(0xa, 0x3, 0x90) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000040)={0x6, {{0xa, 0x4e22, 0x0, @loopback, 0x4b}}}, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0xc) writev(r4, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) splice(r3, 0x0, r4, 0x0, 0x422000a7b, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) socket$isdn_base(0x22, 0x3, 0x0) [ 879.753547] audit: type=1400 audit(1576166371.503:2926): avc: denied { map } for pid=5273 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 880.729580] devpts: called with bogus options 15:59:35 executing program 4: syz_mount_image$gfs2(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x3f, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@noacl='noacl'}, {@upgrade='upgrade'}]}) [ 881.060274] audit: type=1400 audit(1576166371.503:2927): avc: denied { map } for pid=5273 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 881.344570] devpts: called with bogus options 15:59:37 executing program 3: socket$key(0xf, 0x3, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffb4) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000080)=0xfffefffc) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000900)='(', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x1f00000000000000, 0x400000000000d1, &(0x7f0000000000), 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) [ 882.097237] audit: type=1400 audit(1576166371.533:2928): avc: denied { map } for pid=5261 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:59:37 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\$[+%*/^\x00', 0xfffffffffffffffd) modify_ldt$write(0x1, &(0x7f0000000140)={0x6, 0x20000000, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1}, 0x10) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r1, 0xa1, 0xc5}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e063d7261772068618a683d67686173682d63650000000000000000000000000b0000002145d6400000000000000000000000000000000000000000000000000000486ce4ac1d194af6450000000000000000000004380bd737609d9a6b881613957c9589d097ba3b287341e4"], &(0x7f00000002c0)="ac51b47d5f6650fcadef8b88dcb660d2185fdec14038dc8b335bf366ae904bded9f6f6ad7598bb297572a4c0c566eb16f56f994afde78d34bb3cbaef4dea67197c037cbcee560582beee001f149a617e81e69c1e687f0fe0f6ee0c159e698d90463b4fab35845c297625887c48a75e575bb79ea6f9f4903f18e45480cf34b87cd19ac6f3a743105e3fba7a99a49b70736027a965c0d56579d2f173950a6386678b", &(0x7f0000000380)="2c1122a324a50e9208eefca0ceae1f8a35df47abbad479922cad94049f2da190d751877430a8d158bc53ebe0f3ea60f45341d39b2a7257d0181987fafe4bcb717b7b246ceab9e0383000ffe679dbe3c8f22fdbf2524ab1e6c67f7c8ac797630033a02fa623b994b089a158030fc02659fb528cb87eca7440dd5c3c84587c9f7569b320d74ccd805cc6f1cca9ce597d4c866b0cf5f9a5d66a7cb954f1b10003a39e95ed95458d745e9208e26c1ffb0e05b5ac75afab95dad685ff1447fcd55746e18b884ff9") r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{}, 'port0\x00'}) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x4, 0x110, r2, 0xab2ee000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f00000004c0)={0x42, 0x1, 0x2}, 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0xffffffffffffff36, &(0x7f0000000080)={&(0x7f00000002c0)={0x58, r5, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x20f}}}]}}]}, 0x58}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = fcntl$getown(0xffffffffffffffff, 0x9) rt_tgsigqueueinfo(r7, r8, 0x3, &(0x7f00000005c0)={0x1c, 0x401, 0x1000}) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x46082, 0x0) lookup_dcookie(0x9, &(0x7f0000000540)=""/43, 0x2b) r11 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000640)='devlink\x00') sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r12, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x174, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x13c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x5}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e24}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x80000003}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}], @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="43739fee2404ff42b120dede2d7dbfda"}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1c}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xed}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xf187}], @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x9}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x7}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x33}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x1}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x2d}]]}}}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x174}}, 0x0) [ 882.636766] audit: audit_backlog=65 > audit_backlog_limit=64 [ 882.718211] audit: audit_backlog=65 > audit_backlog_limit=64 [ 882.726554] audit: audit_backlog=65 > audit_backlog_limit=64 [ 882.763127] hfs: unable to parse mount options [ 882.841300] audit: audit_backlog=65 > audit_backlog_limit=64 15:59:38 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) close(r0) [ 883.214824] audit: audit_lost=490 audit_rate_limit=0 audit_backlog_limit=64 [ 883.250172] audit: audit_lost=491 audit_rate_limit=0 audit_backlog_limit=64 [ 883.254616] audit: audit_lost=492 audit_rate_limit=0 audit_backlog_limit=64 [ 883.257308] audit: backlog limit exceeded [ 883.350136] audit: audit_lost=493 audit_rate_limit=0 audit_backlog_limit=64 [ 887.113568] kauditd_printk_skb: 143 callbacks suppressed [ 887.113576] audit: type=1400 audit(1576166382.133:3057): avc: denied { map } for pid=5348 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 888.347252] audit: type=1400 audit(1576166382.163:3059): avc: denied { write } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 888.591701] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 889.713665] audit: type=1400 audit(1576166382.193:3060): avc: denied { write } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 891.090102] audit: type=1400 audit(1576166382.193:3061): avc: denied { ioctl } for pid=5346 comm="syz-executor.5" path="socket:[149998]" dev="sockfs" ino=149998 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 892.470294] audit: type=1400 audit(1576166382.213:3062): avc: denied { map } for pid=5344 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 893.520121] audit: type=1400 audit(1576166382.233:3063): avc: denied { map } for pid=5345 comm="syz-executor.3" path="socket:[150001]" dev="sockfs" ino=150001 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=key_socket permissive=1 [ 894.830098] audit: type=1400 audit(1576166382.303:3064): avc: denied { read } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 895.900096] audit: type=1400 audit(1576166382.133:3058): avc: denied { map } for pid=5348 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 897.020324] audit: type=1400 audit(1576166382.333:3065): avc: denied { create } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 898.080116] audit: type=1400 audit(1576166382.333:3066): avc: denied { write } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 899.130316] audit: type=1400 audit(1576166382.413:3067): avc: denied { map } for pid=5344 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 900.220107] audit: type=1400 audit(1576166382.473:3068): avc: denied { read } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 901.320087] audit: type=1400 audit(1576166382.633:3069): avc: denied { map } for pid=5346 comm="syz-executor.5" path="/dev/snd/seq" dev="devtmpfs" ino=17458 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 902.430108] audit: type=1400 audit(1576166382.663:3070): avc: denied { map } for pid=5348 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 903.450107] audit: type=1400 audit(1576166382.693:3071): avc: denied { map } for pid=5346 comm="syz-executor.5" path="/dev/ashmem" dev="devtmpfs" ino=17423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 904.760171] audit: type=1400 audit(1576166382.693:3072): avc: denied { create } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 905.960092] audit: type=1400 audit(1576166382.743:3073): avc: denied { ioctl } for pid=5346 comm="syz-executor.5" path="socket:[149253]" dev="sockfs" ino=149253 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 907.300121] audit: type=1400 audit(1576166382.853:3074): avc: denied { write } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 908.410084] audit: type=1400 audit(1576166382.893:3075): avc: denied { create } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 909.490120] audit: type=1400 audit(1576166383.033:3076): avc: denied { map } for pid=5348 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 910.540131] audit: type=1400 audit(1576166383.033:3077): avc: denied { map } for pid=5348 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 911.670148] audit: type=1400 audit(1576166383.043:3078): avc: denied { create } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 912.790349] audit: type=1400 audit(1576166383.043:3079): avc: denied { write } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 913.780113] audit: type=1400 audit(1576166383.053:3080): avc: denied { write } for pid=5346 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 914.780194] audit: type=1400 audit(1576166383.193:3081): avc: denied { map } for pid=5348 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 915.890103] audit: type=1400 audit(1576166383.193:3082): avc: denied { map } for pid=5348 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 916.900105] audit: type=1400 audit(1576166383.723:3083): avc: denied { map } for pid=5348 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 918.010110] audit: type=1400 audit(1576166383.913:3084): avc: denied { map } for pid=5348 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 919.010199] audit: type=1400 audit(1576166385.803:3085): avc: denied { map } for pid=5368 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 919.916485] audit: type=1400 audit(1576166386.243:3086): avc: denied { map } for pid=5368 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 920.990104] audit: type=1400 audit(1576166386.293:3087): avc: denied { map } for pid=5368 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 921.940101] audit: type=1400 audit(1576166386.293:3088): avc: denied { map } for pid=5368 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 922.880322] audit: type=1400 audit(1576166386.503:3089): avc: denied { map } for pid=5368 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 923.940146] audit: type=1400 audit(1576166386.943:3090): avc: denied { map } for pid=5368 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 924.920136] audit: type=1400 audit(1576166386.943:3091): avc: denied { map } for pid=5368 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 926.000093] audit: type=1400 audit(1576166386.943:3092): avc: denied { map } for pid=5368 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 926.970196] audit: type=1400 audit(1576166387.053:3093): avc: denied { map } for pid=5369 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 927.940246] audit: type=1400 audit(1576166387.053:3094): avc: denied { map } for pid=5369 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 928.890107] audit: type=1400 audit(1576166387.053:3095): avc: denied { map } for pid=5369 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 929.900108] audit: type=1400 audit(1576166387.053:3096): avc: denied { map } for pid=5369 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 930.910112] audit: type=1400 audit(1576166387.133:3097): avc: denied { map } for pid=5370 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 931.840132] audit: type=1400 audit(1576166387.133:3098): avc: denied { map } for pid=5370 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 932.770096] audit: type=1400 audit(1576166387.173:3099): avc: denied { map } for pid=5370 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 933.710149] audit: type=1400 audit(1576166387.173:3100): avc: denied { map } for pid=5370 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 934.760111] audit: type=1400 audit(1576166387.313:3101): avc: denied { map } for pid=5368 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 935.780098] audit: type=1400 audit(1576166387.373:3102): avc: denied { map } for pid=5370 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 936.740191] audit: type=1400 audit(1576166387.423:3103): avc: denied { map } for pid=5368 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 937.820109] audit: type=1400 audit(1576166387.423:3104): avc: denied { map } for pid=5368 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 938.824740] audit: type=1400 audit(1576166387.523:3105): avc: denied { map } for pid=5369 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 939.780099] audit: type=1400 audit(1576166387.733:3106): avc: denied { map } for pid=5370 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 940.860109] audit: type=1400 audit(1576166387.733:3107): avc: denied { map } for pid=5370 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 941.920250] audit: type=1400 audit(1576166387.933:3108): avc: denied { map } for pid=5369 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 942.900116] audit: type=1400 audit(1576166387.933:3109): avc: denied { map } for pid=5369 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 943.950138] audit: type=1400 audit(1576166387.973:3110): avc: denied { map } for pid=5370 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 944.880200] audit: type=1400 audit(1576166387.973:3111): avc: denied { map } for pid=5370 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 945.336194] IPVS: ftp: loaded support on port[0] = 21 [ 945.950100] audit: type=1400 audit(1576166388.013:3112): avc: denied { map } for pid=5369 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 946.920145] audit: type=1400 audit(1576166388.013:3113): avc: denied { map } for pid=5369 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.880104] audit: type=1400 audit(1576166388.493:3114): avc: denied { map } for pid=5369 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 948.890113] audit: type=1400 audit(1576166388.493:3115): avc: denied { map } for pid=5369 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 949.920337] audit: type=1400 audit(1576166388.513:3116): avc: denied { map } for pid=5370 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 950.930098] audit: type=1400 audit(1576166388.513:3117): avc: denied { map } for pid=5370 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 951.919821] audit: type=1400 audit(1576166392.063:3118): avc: denied { map } for pid=5371 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 952.730085] audit: type=1400 audit(1576166392.063:3119): avc: denied { map } for pid=5371 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 953.710094] audit: type=1400 audit(1576166392.493:3120): avc: denied { map } for pid=5371 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 954.630120] audit: type=1400 audit(1576166392.493:3121): avc: denied { map } for pid=5371 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 955.620107] audit: type=1400 audit(1576166392.493:3122): avc: denied { map } for pid=5371 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 956.590190] audit: type=1400 audit(1576166392.783:3123): avc: denied { map } for pid=5371 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 957.560144] audit: type=1400 audit(1576166393.123:3124): avc: denied { map } for pid=5371 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 958.580145] audit: type=1400 audit(1576166393.123:3125): avc: denied { map } for pid=5371 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 959.530146] audit: type=1400 audit(1576166393.123:3126): avc: denied { map } for pid=5371 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 960.620111] audit: type=1400 audit(1576166393.473:3127): avc: denied { map } for pid=5371 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 961.606122] audit: type=1400 audit(1576166393.473:3128): avc: denied { map } for pid=5371 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.660342] audit: type=1400 audit(1576166409.383:3129): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 963.716158] audit: type=1400 audit(1576166409.383:3130): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 964.730129] audit: type=1400 audit(1576166410.043:3131): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/root/syzkaller-shm824573317" dev="sda1" ino=16491 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 965.880124] audit: type=1400 audit(1576166410.043:3132): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/root/syzkaller-shm690437408" dev="sda1" ino=16492 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 967.000142] audit: type=1400 audit(1576166410.223:3133): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 968.060205] audit: type=1400 audit(1576166410.643:3134): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 969.160124] audit: type=1400 audit(1576166410.643:3135): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 970.170095] audit: type=1400 audit(1576166411.083:3136): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 971.200101] audit: type=1400 audit(1576166411.483:3137): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 972.320105] audit: type=1400 audit(1576166411.483:3138): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 973.360141] audit: type=1400 audit(1576166411.903:3139): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 974.500144] audit: type=1400 audit(1576166411.903:3140): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 975.650286] audit: type=1400 audit(1576166412.333:3141): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 976.670104] audit: type=1400 audit(1576166412.733:3142): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 977.750138] audit: type=1400 audit(1576166412.733:3143): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 978.880099] audit: type=1400 audit(1576166413.143:3144): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 979.860234] audit: type=1400 audit(1576166413.573:3145): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 981.019394] audit: type=1400 audit(1576166413.993:3146): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 982.030262] audit: type=1400 audit(1576166413.993:3147): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 983.120147] audit: type=1400 audit(1576166414.403:3148): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 984.270112] audit: type=1400 audit(1576166414.823:3149): avc: denied { map } for pid=5372 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 985.274990] audit: type=1400 audit(1576166432.503:3150): avc: denied { map } for pid=5375 comm="cat" path="/bin/cat" dev="sda1" ino=1432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 986.170088] audit: type=1400 audit(1576166432.503:3151): avc: denied { map } for pid=5375 comm="cat" path="/bin/cat" dev="sda1" ino=1432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.125845] audit: type=1400 audit(1576166432.903:3152): avc: denied { map } for pid=5375 comm="cat" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.220099] audit: type=1400 audit(1576166432.903:3153): avc: denied { map } for pid=5375 comm="cat" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 989.200091] audit: type=1400 audit(1576166432.903:3154): avc: denied { map } for pid=5375 comm="cat" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 990.136671] audit: type=1400 audit(1576166433.343:3155): avc: denied { map } for pid=5375 comm="cat" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 991.150098] audit: type=1400 audit(1576166433.343:3156): avc: denied { map } for pid=5375 comm="cat" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.330307] audit: type=1400 audit(1576166433.973:3157): avc: denied { map } for pid=3180 comm="ifup" path="/sbin/ifup" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 993.120097] audit: type=1400 audit(1576166433.973:3158): avc: denied { map } for pid=3180 comm="ifup" path="/sbin/ifup" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 994.010196] audit: type=1400 audit(1576166433.973:3159): avc: denied { map } for pid=3180 comm="ifup" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 995.084736] audit: type=1400 audit(1576166433.973:3160): avc: denied { map } for pid=3180 comm="ifup" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 996.070188] audit: type=1400 audit(1576166434.353:3161): avc: denied { map } for pid=3180 comm="ifup" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.110195] audit: type=1400 audit(1576166434.353:3162): avc: denied { map } for pid=3180 comm="ifup" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.060096] audit: type=1400 audit(1576166434.763:3163): avc: denied { map } for pid=3180 comm="ifup" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 999.090172] audit: type=1400 audit(1576166490.093:3164): avc: denied { map } for pid=3196 comm="ifdown" path="/sbin/ifdown" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 999.950133] audit: type=1400 audit(1576166490.093:3165): avc: denied { map } for pid=3196 comm="ifdown" path="/sbin/ifdown" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1000.303791] device bridge_slave_1 left promiscuous mode [ 1000.309422] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.900115] audit: type=1400 audit(1576166490.443:3166): avc: denied { map } for pid=3196 comm="ifdown" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1001.900102] audit: type=1400 audit(1576166490.443:3167): avc: denied { map } for pid=3196 comm="ifdown" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.230933] device bridge_slave_0 left promiscuous mode [ 1002.236458] bridge0: port 1(bridge_slave_0) entered disabled state [ 1002.890202] audit: type=1400 audit(1576166490.443:3168): avc: denied { map } for pid=3196 comm="ifdown" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1004.010096] audit: type=1400 audit(1576166490.763:3169): avc: denied { map } for pid=3196 comm="ifdown" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1005.010137] audit: type=1400 audit(1576166490.763:3170): avc: denied { map } for pid=3196 comm="ifdown" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1005.980101] audit: type=1400 audit(1576166491.813:3171): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1007.150185] audit: type=1400 audit(1576166491.813:3172): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/root/syz-executor.2" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1007.673365] bond801 (unregistering): Released all slaves [ 1007.876136] bond800 (unregistering): Released all slaves [ 1008.256109] audit: type=1400 audit(1576166492.173:3173): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/root/syzkaller-shm824573317" dev="sda1" ino=16491 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1008.346653] bond799 (unregistering): Released all slaves [ 1008.827875] bond798 (unregistering): Released all slaves [ 1009.316261] bond797 (unregistering): Released all slaves [ 1009.430148] audit: type=1400 audit(1576166492.173:3174): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/root/syzkaller-shm690437408" dev="sda1" ino=16492 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1009.906509] bond796 (unregistering): Released all slaves [ 1010.416471] bond795 (unregistering): Released all slaves [ 1010.550168] audit: type=1400 audit(1576166492.593:3175): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1010.886595] bond794 (unregistering): Released all slaves [ 1011.336533] bond793 (unregistering): Released all slaves [ 1011.690116] audit: type=1400 audit(1576166493.023:3176): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1011.826078] bond792 (unregistering): Released all slaves [ 1012.336717] bond791 (unregistering): Released all slaves [ 1012.866211] bond790 (unregistering): Released all slaves [ 1012.920115] audit: type=1400 audit(1576166493.023:3177): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1013.346139] bond789 (unregistering): Released all slaves [ 1013.816566] bond788 (unregistering): Released all slaves [ 1014.000103] audit: type=1400 audit(1576166493.453:3178): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1014.576451] bond787 (unregistering): Released all slaves [ 1015.060108] audit: type=1400 audit(1576166493.873:3179): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1015.097060] bond786 (unregistering): Released all slaves [ 1015.526720] bond785 (unregistering): Released all slaves [ 1016.066553] bond784 (unregistering): Released all slaves [ 1016.160133] audit: type=1400 audit(1576166494.003:3180): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1016.606231] bond783 (unregistering): Released all slaves [ 1017.036603] bond782 (unregistering): Released all slaves [ 1017.420095] audit: type=1400 audit(1576166494.403:3181): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1017.831408] bond781 (unregistering): Released all slaves [ 1018.203474] bond780 (unregistering): Released all slaves [ 1018.480106] audit: type=1400 audit(1576166494.403:3182): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1018.666534] bond779 (unregistering): Released all slaves [ 1019.076179] bond778 (unregistering): Released all slaves [ 1019.486536] bond777 (unregistering): Released all slaves [ 1019.830105] audit: type=1400 audit(1576166494.813:3183): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1020.016689] bond776 (unregistering): Released all slaves [ 1020.506598] bond775 (unregistering): Released all slaves [ 1020.850152] audit: type=1400 audit(1576166495.243:3184): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1021.096613] bond774 (unregistering): Released all slaves [ 1021.556160] bond773 (unregistering): Released all slaves [ 1021.920129] audit: type=1400 audit(1576166495.243:3185): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1022.018470] bond772 (unregistering): Released all slaves [ 1022.616498] bond771 (unregistering): Released all slaves [ 1023.020105] audit: type=1400 audit(1576166495.593:3186): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1023.126549] bond770 (unregistering): Released all slaves [ 1023.636530] bond769 (unregistering): Released all slaves [ 1024.080131] audit: type=1400 audit(1576166496.023:3187): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1024.137556] bond768 (unregistering): Released all slaves [ 1024.626558] bond767 (unregistering): Released all slaves [ 1025.136603] bond766 (unregistering): Released all slaves [ 1025.190298] audit: type=1400 audit(1576166496.023:3188): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1025.626049] bond765 (unregistering): Released all slaves [ 1026.156519] bond764 (unregistering): Released all slaves [ 1026.340112] audit: type=1400 audit(1576166496.403:3189): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1026.636653] bond763 (unregistering): Released all slaves [ 1027.156610] bond762 (unregistering): Released all slaves [ 1027.390150] audit: type=1400 audit(1576166496.823:3190): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1027.823009] bond761 (unregistering): Released all slaves [ 1028.214710] bond760 (unregistering): Released all slaves [ 1028.530856] audit: type=1400 audit(1576166497.243:3191): avc: denied { map } for pid=5376 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15745 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1028.636482] bond759 (unregistering): Released all slaves [ 1029.127913] bond758 (unregistering): Released all slaves [ 1029.626855] audit: type=1400 audit(1576166507.923:3192): avc: denied { map } for pid=5381 comm="cat" path="/bin/cat" dev="sda1" ino=1432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1029.725934] bond757 (unregistering): Released all slaves [ 1030.186415] bond756 (unregistering): Released all slaves [ 1030.480089] audit: type=1400 audit(1576166507.923:3193): avc: denied { map } for pid=5381 comm="cat" path="/bin/cat" dev="sda1" ino=1432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1030.636569] bond755 (unregistering): Released all slaves [ 1031.126458] bond754 (unregistering): Released all slaves [ 1031.440102] audit: type=1400 audit(1576166508.333:3194): avc: denied { map } for pid=5381 comm="cat" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1031.706758] bond753 (unregistering): Released all slaves [ 1032.136661] bond752 (unregistering): Released all slaves [ 1032.370131] audit: type=1400 audit(1576166508.333:3195): avc: denied { map } for pid=5381 comm="cat" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1032.716061] bond751 (unregistering): Released all slaves [ 1033.126307] bond750 (unregistering): Released all slaves [ 1033.520097] audit: type=1400 audit(1576166508.333:3196): avc: denied { map } for pid=5381 comm="cat" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1033.636502] bond749 (unregistering): Released all slaves [ 1034.137560] bond748 (unregistering): Released all slaves [ 1034.456526] bond747 (unregistering): Released all slaves [ 1034.490157] audit: type=1400 audit(1576166508.753:3197): avc: denied { map } for pid=5381 comm="cat" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1034.926758] bond746 (unregistering): Released all slaves [ 1035.410240] audit: type=1400 audit(1576166508.753:3198): avc: denied { map } for pid=5381 comm="cat" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1035.513167] bond745 (unregistering): Released all slaves [ 1035.875144] bond744 (unregistering): Released all slaves [ 1036.326426] bond743 (unregistering): Released all slaves [ 1036.450103] audit: type=1400 audit(1576166509.193:3199): avc: denied { map } for pid=3201 comm="ifup" path="/sbin/ifup" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1036.856562] bond742 (unregistering): Released all slaves [ 1037.370095] audit: type=1400 audit(1576166509.193:3200): avc: denied { map } for pid=3201 comm="ifup" path="/sbin/ifup" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1037.566458] bond741 (unregistering): Released all slaves [ 1038.056596] bond740 (unregistering): Released all slaves [ 1038.300253] audit: type=1400 audit(1576166509.503:3201): avc: denied { map } for pid=3201 comm="ifup" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1038.596619] bond739 (unregistering): Released all slaves [ 1039.106470] bond738 (unregistering): Released all slaves [ 1039.280147] audit: type=1400 audit(1576166509.503:3202): avc: denied { map } for pid=3201 comm="ifup" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1039.787148] bond737 (unregistering): Released all slaves [ 1040.077163] bond736 (unregistering): Released all slaves [ 1040.380105] audit: type=1400 audit(1576166509.503:3203): avc: denied { map } for pid=3201 comm="ifup" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1040.812505] bond735 (unregistering): Released all slaves [ 1041.224209] bond734 (unregistering): Released all slaves [ 1041.350176] audit: type=1400 audit(1576166509.883:3204): avc: denied { map } for pid=3201 comm="ifup" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1041.900355] bond733 (unregistering): Released all slaves [ 1042.312521] bond732 (unregistering): Released all slaves [ 1042.440110] audit: type=1400 audit(1576166509.883:3205): avc: denied { map } for pid=3201 comm="ifup" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1042.892429] bond731 (unregistering): Released all slaves [ 1043.295821] bond730 (unregistering): Released all slaves [ 1043.520122] audit: type=1400 audit(1576166523.893:3206): avc: denied { map } for pid=3255 comm="ifdown" path="/sbin/ifdown" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1043.936709] bond729 (unregistering): Released all slaves [ 1044.547051] audit: type=1400 audit(1576166523.893:3207): avc: denied { map } for pid=3255 comm="ifdown" path="/sbin/ifdown" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1044.587226] bond728 (unregistering): Released all slaves [ 1045.016305] bond727 (unregistering): Released all slaves [ 1045.566428] bond726 (unregistering): Released all slaves [ 1045.592808] audit: type=1400 audit(1576166523.893:3208): avc: denied { map } for pid=3255 comm="ifdown" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1046.541788] bond725 (unregistering): Released all slaves [ 1046.600113] audit: type=1400 audit(1576166523.893:3209): avc: denied { map } for pid=3255 comm="ifdown" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1046.974267] bond724 (unregistering): Released all slaves [ 1047.376680] bond723 (unregistering): Released all slaves [ 1047.650104] audit: type=1400 audit(1576166524.303:3210): avc: denied { map } for pid=3255 comm="ifdown" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1047.866571] bond722 (unregistering): Released all slaves [ 1048.356457] bond721 (unregistering): Released all slaves [ 1048.670090] audit: type=1400 audit(1576166524.303:3211): avc: denied { map } for pid=3255 comm="ifdown" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1049.044257] bond720 (unregistering): Released all slaves [ 1049.476090] bond719 (unregistering): Released all slaves [ 1049.710101] audit: type=1400 audit(1576166524.693:3212): avc: denied { map } for pid=3255 comm="ifdown" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1050.137808] bond718 (unregistering): Released all slaves [ 1050.646840] bond717 (unregistering): Released all slaves [ 1050.810111] audit: type=1400 audit(1576166543.603:3213): avc: denied { map } for pid=3213 comm="ifdown" path="/sbin/ifdown" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1051.157999] bond716 (unregistering): Released all slaves [ 1051.626534] bond715 (unregistering): Released all slaves [ 1051.790221] audit: type=1400 audit(1576166543.603:3214): avc: denied { map } for pid=3213 comm="ifdown" path="/sbin/ifdown" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1052.146523] bond714 (unregistering): Released all slaves [ 1052.656598] bond713 (unregistering): Released all slaves [ 1052.890128] audit: type=1400 audit(1576166543.793:3215): avc: denied { map } for pid=3213 comm="ifdown" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1053.166525] bond712 (unregistering): Released all slaves [ 1053.668924] bond711 (unregistering): Released all slaves [ 1053.860364] audit: type=1400 audit(1576166543.793:3216): avc: denied { map } for pid=3213 comm="ifdown" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1054.076390] bond710 (unregistering): Released all slaves [ 1054.566575] bond709 (unregistering): Released all slaves [ 1054.830222] audit: type=1400 audit(1576166543.793:3217): avc: denied { map } for pid=3213 comm="ifdown" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1055.056246] bond708 (unregistering): Released all slaves [ 1055.526191] bond707 (unregistering): Released all slaves [ 1055.760101] audit: type=1400 audit(1576166544.183:3218): avc: denied { map } for pid=3213 comm="ifdown" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1055.986224] bond706 (unregistering): Released all slaves [ 1056.456170] bond705 (unregistering): Released all slaves [ 1056.670099] audit: type=1400 audit(1576166544.183:3219): avc: denied { map } for pid=3213 comm="ifdown" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1056.896117] bond704 (unregistering): Released all slaves [ 1057.386602] bond703 (unregistering): Released all slaves [ 1057.750117] audit: type=1400 audit(1576166546.283:3220): avc: denied { map } for pid=5383 comm="cat" path="/bin/cat" dev="sda1" ino=1432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1057.876528] bond702 (unregistering): Released all slaves [ 1058.356348] bond701 (unregistering): Released all slaves [ 1058.561546] audit: type=1400 audit(1576166546.283:3221): avc: denied { map } for pid=5383 comm="cat" path="/bin/cat" dev="sda1" ino=1432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1058.866604] bond700 (unregistering): Released all slaves [ 1059.326504] bond699 (unregistering): Released all slaves [ 1059.450102] audit: type=1400 audit(1576166546.673:3222): avc: denied { map } for pid=5383 comm="cat" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1059.816408] bond698 (unregistering): Released all slaves [ 1060.256139] bond697 (unregistering): Released all slaves [ 1060.400139] audit: type=1400 audit(1576166546.673:3223): avc: denied { map } for pid=5383 comm="cat" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1060.893103] bond696 (unregistering): Released all slaves [ 1061.265741] bond695 (unregistering): Released all slaves [ 1061.380266] audit: type=1400 audit(1576166546.673:3224): avc: denied { map } for pid=5383 comm="cat" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1061.706681] bond694 (unregistering): Released all slaves [ 1062.262359] bond693 (unregistering): Released all slaves [ 1062.290100] audit: type=1400 audit(1576166547.063:3225): avc: denied { map } for pid=5383 comm="cat" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1062.664985] bond692 (unregistering): Released all slaves [ 1063.056179] bond691 (unregistering): Released all slaves [ 1063.290208] audit: type=1400 audit(1576166547.063:3226): avc: denied { map } for pid=5383 comm="cat" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1063.556450] bond690 (unregistering): Released all slaves [ 1064.036672] bond689 (unregistering): Released all slaves [ 1064.200114] audit: type=1400 audit(1576166547.483:3227): avc: denied { map } for pid=3246 comm="ifup" path="/sbin/ifup" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1064.516527] bond688 (unregistering): Released all slaves [ 1064.966181] bond687 (unregistering): Released all slaves [ 1065.030109] audit: type=1400 audit(1576166547.483:3228): avc: denied { map } for pid=3246 comm="ifup" path="/sbin/ifup" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1065.456166] bond686 (unregistering): Released all slaves [ 1065.926235] bond685 (unregistering): Released all slaves [ 1066.000113] audit: type=1400 audit(1576166547.733:3229): avc: denied { map } for pid=3246 comm="ifup" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1066.416469] bond684 (unregistering): Released all slaves [ 1066.890102] audit: type=1400 audit(1576166547.733:3230): avc: denied { map } for pid=3246 comm="ifup" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1067.032569] bond683 (unregistering): Released all slaves [ 1067.394602] bond682 (unregistering): Released all slaves [ 1067.796286] bond681 (unregistering): Released all slaves [ 1067.840154] audit: type=1400 audit(1576166548.133:3231): avc: denied { map } for pid=3246 comm="ifup" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1068.246521] bond680 (unregistering): Released all slaves [ 1068.726530] bond679 (unregistering): Released all slaves [ 1068.810136] audit: type=1400 audit(1576166548.133:3232): avc: denied { map } for pid=3246 comm="ifup" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1069.236474] bond678 (unregistering): Released all slaves [ 1069.676339] bond677 (unregistering): Released all slaves [ 1069.790106] audit: type=1400 audit(1576166548.133:3233): avc: denied { map } for pid=3246 comm="ifup" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1070.196100] bond676 (unregistering): Released all slaves [ 1070.626629] bond675 (unregistering): Released all slaves [ 1071.086525] bond674 (unregistering): Released all slaves [ 1071.566450] bond673 (unregistering): Released all slaves [ 1072.026392] bond672 (unregistering): Released all slaves [ 1072.476368] bond671 (unregistering): Released all slaves [ 1072.946726] bond670 (unregistering): Released all slaves [ 1073.446934] bond669 (unregistering): Released all slaves [ 1073.906072] bond668 (unregistering): Released all slaves [ 1074.554356] bond667 (unregistering): Released all slaves [ 1074.986457] bond666 (unregistering): Released all slaves [ 1075.616210] bond665 (unregistering): Released all slaves [ 1076.086500] bond664 (unregistering): Released all slaves [ 1076.526612] bond663 (unregistering): Released all slaves [ 1077.176729] bond662 (unregistering): Released all slaves [ 1077.646493] bond661 (unregistering): Released all slaves [ 1078.036821] bond660 (unregistering): Released all slaves [ 1078.616679] bond659 (unregistering): Released all slaves [ 1079.201594] bond658 (unregistering): Released all slaves [ 1079.527838] bond657 (unregistering): Released all slaves [ 1080.104595] bond656 (unregistering): Released all slaves [ 1080.612970] bond655 (unregistering): Released all slaves [ 1080.914690] bond654 (unregistering): Released all slaves [ 1081.528162] bond653 (unregistering): Released all slaves [ 1081.972577] bond652 (unregistering): Released all slaves [ 1082.402918] bond651 (unregistering): Released all slaves [ 1082.708258] bond650 (unregistering): Released all slaves [ 1083.271520] bond649 (unregistering): Released all slaves [ 1083.666264] bond648 (unregistering): Released all slaves [ 1084.126714] bond647 (unregistering): Released all slaves [ 1084.652355] bond646 (unregistering): Released all slaves [ 1085.109276] bond645 (unregistering): Released all slaves [ 1085.512438] bond644 (unregistering): Released all slaves [ 1085.991850] bond643 (unregistering): Released all slaves [ 1086.469396] bond642 (unregistering): Released all slaves [ 1086.814446] bond641 (unregistering): Released all slaves [ 1087.502347] bond640 (unregistering): Released all slaves [ 1087.914786] bond639 (unregistering): Released all slaves [ 1088.331636] bond638 (unregistering): Released all slaves [ 1088.665574] bond637 (unregistering): Released all slaves [ 1089.216665] bond636 (unregistering): Released all slaves [ 1089.806368] bond635 (unregistering): Released all slaves [ 1090.245578] bond634 (unregistering): Released all slaves [ 1090.745111] bond633 (unregistering): Released all slaves [ 1091.166547] bond632 (unregistering): Released all slaves [ 1091.860617] bond631 (unregistering): Released all slaves [ 1092.224491] bond630 (unregistering): Released all slaves [ 1092.792281] bond629 (unregistering): Released all slaves [ 1093.164156] bond628 (unregistering): Released all slaves [ 1093.535885] bond627 (unregistering): Released all slaves [ 1094.102253] bond626 (unregistering): Released all slaves [ 1094.474079] bond625 (unregistering): Released all slaves [ 1094.815683] bond624 (unregistering): Released all slaves [ 1095.256165] bond623 (unregistering): Released all slaves [ 1095.756181] bond622 (unregistering): Released all slaves [ 1096.176461] bond621 (unregistering): Released all slaves [ 1096.616511] bond620 (unregistering): Released all slaves [ 1097.046745] bond619 (unregistering): Released all slaves [ 1097.596153] bond618 (unregistering): Released all slaves [ 1098.006552] bond617 (unregistering): Released all slaves [ 1098.523994] bond616 (unregistering): Released all slaves [ 1098.895864] bond615 (unregistering): Released all slaves [ 1099.476201] bond614 (unregistering): Released all slaves [ 1099.926167] bond613 (unregistering): Released all slaves [ 1100.296463] bond612 (unregistering): Released all slaves [ 1100.706545] bond611 (unregistering): Released all slaves [ 1101.186146] bond610 (unregistering): Released all slaves [ 1101.782174] bond609 (unregistering): Released all slaves [ 1102.144576] bond608 (unregistering): Released all slaves [ 1102.576576] bond607 (unregistering): Released all slaves [ 1102.736336] audit: type=1400 audit(1576166597.753:3234): avc: denied { map } for pid=5385 comm="cat" path="/bin/cat" dev="sda1" ino=1432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.036356] bond606 (unregistering): Released all slaves [ 1103.350128] audit: type=1400 audit(1576166598.013:3235): avc: denied { map } for pid=5385 comm="cat" path="/bin/cat" dev="sda1" ino=1432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1103.466459] bond605 (unregistering): Released all slaves [ 1103.936279] bond604 (unregistering): Released all slaves [ 1104.170189] audit: type=1400 audit(1576166598.013:3236): avc: denied { map } for pid=5385 comm="cat" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1104.386133] bond603 (unregistering): Released all slaves [ 1104.886520] bond602 (unregistering): Released all slaves [ 1105.130219] audit: type=1400 audit(1576166598.013:3237): avc: denied { map } for pid=5385 comm="cat" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1105.482287] bond601 (unregistering): Released all slaves [ 1105.854023] bond600 (unregistering): Released all slaves [ 1106.080106] audit: type=1400 audit(1576166598.533:3238): avc: denied { map } for pid=5385 comm="cat" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1106.255688] bond599 (unregistering): Released all slaves [ 1106.668957] bond598 (unregistering): Released all slaves [ 1106.920100] audit: type=1400 audit(1576166598.533:3239): avc: denied { map } for pid=5385 comm="cat" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1107.206515] bond597 (unregistering): Released all slaves [ 1107.676709] bond596 (unregistering): Released all slaves [ 1107.800097] audit: type=1400 audit(1576166598.533:3240): avc: denied { map } for pid=5385 comm="cat" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1108.126090] bond595 (unregistering): Released all slaves [ 1108.546175] bond594 (unregistering): Released all slaves [ 1108.770091] audit: type=1400 audit(1576166599.323:3241): avc: denied { map } for pid=3293 comm="ifup" path="/sbin/ifup" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1108.986554] bond593 (unregistering): Released all slaves [ 1109.526257] bond592 (unregistering): Released all slaves [ 1109.610222] audit: type=1400 audit(1576166599.323:3242): avc: denied { map } for pid=3293 comm="ifup" path="/sbin/ifup" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1110.246387] bond591 (unregistering): Released all slaves [ 1110.614872] audit: type=1400 audit(1576166599.323:3243): avc: denied { map } for pid=3293 comm="ifup" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1110.726399] bond590 (unregistering): Released all slaves [ 1111.146452] bond589 (unregistering): Released all slaves [ 1111.566325] bond588 (unregistering): Released all slaves [ 1111.610121] audit: type=1400 audit(1576166599.323:3244): avc: denied { map } for pid=3293 comm="ifup" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1112.048047] bond587 (unregistering): Released all slaves [ 1112.586457] bond586 (unregistering): Released all slaves [ 1112.599140] audit: type=1400 audit(1576166599.663:3245): avc: denied { map } for pid=3293 comm="ifup" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1113.076500] bond585 (unregistering): Released all slaves [ 1113.440101] audit: type=1400 audit(1576166599.663:3246): avc: denied { map } for pid=3293 comm="ifup" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1113.496131] bond584 (unregistering): Released all slaves [ 1113.946111] bond583 (unregistering): Released all slaves [ 1114.330217] audit: type=1400 audit(1576166600.073:3247): avc: denied { map } for pid=3293 comm="ifup" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1114.426070] bond582 (unregistering): Released all slaves [ 1114.906410] bond581 (unregistering): Released all slaves [ 1115.356385] bond580 (unregistering): Released all slaves [ 1116.096911] bond579 (unregistering): Released all slaves [ 1116.692336] bond578 (unregistering): Released all slaves [ 1117.124191] bond577 (unregistering): Released all slaves [ 1117.462234] bond576 (unregistering): Released all slaves [ 1118.074233] bond575 (unregistering): Released all slaves [ 1118.542205] bond574 (unregistering): Released all slaves [ 1119.026199] bond573 (unregistering): Released all slaves [ 1119.365606] bond572 (unregistering): Released all slaves [ 1119.887756] bond571 (unregistering): Released all slaves [ 1120.356272] bond570 (unregistering): Released all slaves [ 1120.837816] bond569 (unregistering): Released all slaves [ 1121.336656] bond568 (unregistering): Released all slaves [ 1122.102424] bond567 (unregistering): Released all slaves [ 1122.455811] bond566 (unregistering): Released all slaves [ 1123.006595] bond565 (unregistering): Released all slaves [ 1123.572427] bond564 (unregistering): Released all slaves [ 1124.007544] bond563 (unregistering): Released all slaves [ 1124.467068] bond562 (unregistering): Released all slaves [ 1125.162382] bond561 (unregistering): Released all slaves [ 1125.445232] bond560 (unregistering): Released all slaves [ 1125.796411] bond559 (unregistering): Released all slaves [ 1126.306191] bond558 (unregistering): Released all slaves [ 1126.832755] bond557 (unregistering): Released all slaves [ 1127.234834] bond556 (unregistering): Released all slaves [ 1127.616138] bond555 (unregistering): Released all slaves [ 1128.026446] bond554 (unregistering): Released all slaves [ 1128.487628] bond553 (unregistering): Released all slaves [ 1128.986135] bond552 (unregistering): Released all slaves [ 1129.426074] bond551 (unregistering): Released all slaves [ 1129.885866] bond550 (unregistering): Released all slaves [ 1130.286103] bond549 (unregistering): Released all slaves [ 1130.900734] bond548 (unregistering): Released all slaves [ 1131.282775] bond547 (unregistering): Released all slaves [ 1131.654947] bond546 (unregistering): Released all slaves [ 1132.046732] bond545 (unregistering): Released all slaves [ 1132.516737] bond544 (unregistering): Released all slaves [ 1132.956189] bond543 (unregistering): Released all slaves [ 1133.446522] bond542 (unregistering): Released all slaves [ 1133.906128] bond541 (unregistering): Released all slaves [ 1134.356049] bond540 (unregistering): Released all slaves [ 1134.977639] bond539 (unregistering): Released all slaves [ 1135.206165] bond538 (unregistering): Released all slaves [ 1135.656495] bond537 (unregistering): Released all slaves [ 1136.086442] bond536 (unregistering): Released all slaves [ 1136.556094] bond535 (unregistering): Released all slaves [ 1137.026324] bond534 (unregistering): Released all slaves [ 1137.416508] bond533 (unregistering): Released all slaves [ 1137.856491] bond532 (unregistering): Released all slaves [ 1138.366158] bond531 (unregistering): Released all slaves [ 1139.012616] bond530 (unregistering): Released all slaves [ 1139.374770] bond529 (unregistering): Released all slaves [ 1139.836501] bond528 (unregistering): Released all slaves [ 1140.306591] bond527 (unregistering): Released all slaves [ 1140.756146] bond526 (unregistering): Released all slaves [ 1141.156158] bond525 (unregistering): Released all slaves [ 1141.616201] bond524 (unregistering): Released all slaves [ 1142.058060] bond523 (unregistering): Released all slaves [ 1142.576507] bond522 (unregistering): Released all slaves [ 1142.986102] bond521 (unregistering): Released all slaves [ 1143.406106] bond520 (unregistering): Released all slaves [ 1143.876441] bond519 (unregistering): Released all slaves [ 1144.286498] bond518 (unregistering): Released all slaves [ 1144.756063] bond517 (unregistering): Released all slaves