f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:02 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4, r2}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r3, r3, &(0x7f0000000200), 0xa198) r4 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r5 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r7 = socket(0x0, 0x2, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r6, @ANYRES16=r4, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r6, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r8, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000002000600", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYBLOB="40000100240001007072696f7269747900000000000000000004000000000008a000000001800000080003000e00000008000400ffff000008000600", @ANYRES32=r2, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r9, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r2, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1c}, 0x1, 0x0, 0x0, 0x60018981}, 0x4048060) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r14}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r19, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r19, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r21 = syz_open_procfs(0x0, 0x0) lseek(r21, 0x0, 0x1) getpeername$packet(r21, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r23 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r23, 0x0, 0x1) getsockopt$inet6_mreq(r23, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r4, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r11}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r15}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r17}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r24}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) r25 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r26 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r26, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r25, 0xc028660f, &(0x7f0000000200)={0x0, r26, 0x0, 0x0, 0x800000000}) getsockname$packet(r25, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast, 0x0}, &(0x7f0000000140)=0xc) r29 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r30, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r29, &(0x7f0000000000), 0x10000}]) ioctl$sock_SIOCGIFINDEX(r29, 0x8933, &(0x7f0000000240)={'netpci0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000440)={@multicast2, @loopback, 0x0}, &(0x7f0000000480)=0xc) r33 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r34 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r34, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r33, 0xc028660f, &(0x7f0000000200)={0x0, r34, 0x0, 0x0, 0x800000000}) ioctl$ifreq_SIOCGIFINDEX_team(r34, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r37 = socket(0x11, 0x800000003, 0x0) bind(r37, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r37, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000006640)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a90000000000008208a9d9f4f9894b94e88cdad311d4a63451a753028305ef754f604b0dee42a22d4c3fa178ba58f8c33496ded92dc06b828bf3621f032f3f5eae08891f9ff872a54e91dad93c71f9a2c7576f096faa11441602afbc6e56c7b375293c47ae072d33654144ccef41afdc5944ceb460696b9f8375bb35166e2621eefa821bca547faeec3d4fd3602a0610899e43b4adbdd4caa34f4818bf6690280481cf58a2359a0bdec32fc598a0cec2827f", @ANYRES32=r38], 0x2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) r40 = socket(0x11, 0x800000003, 0x0) bind(r40, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r40, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r41], 0x2}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000740)=0xe8) r44 = socket(0x11, 0x800000003, 0x0) bind(r44, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r44, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r45], 0x2}}, 0x0) r46 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r47, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r46, &(0x7f0000000000), 0x10000}]) ioctl$ifreq_SIOCGIFINDEX_vcan(r46, 0x8933, &(0x7f00000008c0)={'vcan0\x00', 0x0}) r49 = socket(0x11, 0x800000003, 0x0) bind(r49, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r49, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r50], 0x2}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@dev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000ac0)=0xe8) r51 = socket(0x11, 0x800000003, 0x0) bind(r51, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r51, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r52], 0x2}}, 0x0) r53 = socket(0x11, 0x800000003, 0x0) bind(r53, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r53, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r54], 0x2}}, 0x0) r55 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r56, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r55, &(0x7f0000000000), 0x10000}]) getsockopt$inet_IP_IPSEC_POLICY(r55, 0x0, 0x10, &(0x7f0000000b00)={{{@in6=@ipv4={[], [], @loopback}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000900)=0xe8) recvmmsg(r0, &(0x7f0000005a40)=[{{&(0x7f0000000c40)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000cc0)=""/77, 0x4d}, {&(0x7f0000000d40)=""/12, 0xc}, {&(0x7f0000000d80)=""/210, 0xd2}, {&(0x7f0000000e80)=""/178, 0xb2}, {&(0x7f0000000f40)=""/100, 0x64}, {&(0x7f0000000fc0)=""/198, 0xc6}, {&(0x7f00000010c0)=""/155, 0x9b}, {&(0x7f0000001180)=""/91, 0x5b}, {&(0x7f0000001200)=""/30, 0x1e}], 0x9}}, {{&(0x7f0000001300)=@tipc, 0x80, &(0x7f0000001480)=[{&(0x7f0000001380)=""/210, 0xd2}], 0x1, &(0x7f00000014c0)=""/7, 0x7}, 0x5}, {{&(0x7f0000001500)=@alg, 0x80, &(0x7f0000001640)=[{&(0x7f0000001580)=""/177, 0xb1}], 0x1, &(0x7f0000001680)=""/4096, 0x1000}}, {{&(0x7f0000002680)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000003a00)=[{&(0x7f0000002700)=""/127, 0x7f}, {&(0x7f0000002780)=""/123, 0x7b}, {&(0x7f0000002800)=""/230, 0xe6}, {&(0x7f0000002900)=""/4096, 0x1000}, {&(0x7f0000003900)=""/82, 0x52}, {&(0x7f0000003980)=""/79, 0x4f}], 0x6, &(0x7f0000003a80)=""/97, 0x61}, 0x8}, {{&(0x7f0000003b00)=@pptp, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000003b80)=""/6, 0x6}], 0x1, &(0x7f0000003c00)=""/50, 0x32}, 0x800}, {{&(0x7f0000003c40)=@nfc_llcp, 0x80, &(0x7f0000004100)=[{&(0x7f0000003cc0)=""/90, 0x5a}, {&(0x7f0000003d40)=""/34, 0x22}, {&(0x7f0000003d80)=""/177, 0xb1}, {&(0x7f0000003e40)=""/50, 0x32}, {&(0x7f0000003e80)=""/188, 0xbc}, {&(0x7f0000003f40)=""/60, 0x3c}, {&(0x7f0000003f80)=""/99, 0x63}, {&(0x7f0000004000)=""/109, 0x6d}, {&(0x7f0000004080)=""/114, 0x72}], 0x9, &(0x7f00000041c0)=""/41, 0x29}, 0x413b}, {{&(0x7f0000004200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000005600)=[{&(0x7f0000004280)=""/127, 0x7f}, {&(0x7f0000004300)=""/48, 0x30}, {&(0x7f0000004340)=""/203, 0xcb}, {&(0x7f0000004440)=""/165, 0xa5}, {&(0x7f0000004500)=""/67, 0x43}, {&(0x7f0000004580)=""/4096, 0x1000}, {&(0x7f0000005580)=""/34, 0x22}, {&(0x7f00000055c0)=""/17, 0x11}], 0x8, &(0x7f0000005680)=""/28, 0x1c}}, {{&(0x7f00000056c0)=@nfc, 0x80, &(0x7f00000058c0)=[{&(0x7f0000005740)=""/223, 0xdf}, {&(0x7f0000005840)=""/111, 0x6f}], 0x2, &(0x7f0000005900)=""/154, 0x9a}, 0x8}, {{0x0, 0x0, &(0x7f00000059c0), 0x0, &(0x7f0000005a00)=""/26, 0x1a}, 0x6}], 0x9, 0x40000000, &(0x7f0000005c80)={0x77359400}) r59 = socket(0x11, 0x800000003, 0x0) bind(r59, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r59, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r60], 0x2}}, 0x0) r61 = socket(0x11, 0x800000003, 0x0) bind(r61, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r61, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r62], 0x2}}, 0x0) r63 = socket(0x11, 0x800000003, 0x0) bind(r63, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r63, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r64], 0x2}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005cc0)={0x0, @local}, &(0x7f0000005d00)=0xc) r66 = socket(0x11, 0x800000003, 0x0) bind(r66, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r66, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r67], 0x2}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000005d80)={'lapb0\x00', r67}) r69 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r70, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r69, &(0x7f0000000000), 0x10000}]) getsockname$packet(r69, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000059c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000006600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000065c0)={&(0x7f0000005dc0)={0x7d8, r4, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r27}, {0x80, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x22c8}}, {0x8, 0x6, r28}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}]}}, {{0x8, 0x1, r32}, {0x90, 0x2, [{0x4c, 0x1, @queue_id={{{0x0, 0x1, 'queue_id\x00'}}, {0x0, 0x6, r71}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r35}}, {0x8}}}]}}, {{0x8, 0x1, r36}, {0xbc, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x80, 0x3, 0xa6, 0xffffffff}, {0x8, 0x2, 0x3, 0x8}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r38}}}]}}, {{0x8, 0x1, r39}, {0x7c, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r41}}}]}}, {{0x8, 0x1, r42}, {0x1e4, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r43}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0xfffffffffffffd93, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r45}}}, {0xfffffda0, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2cb}}, {0x8, 0x6, r48}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r50}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_sT\xe29|\xd0\x9b\x18\x1e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x10c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfffff2ea}}, {0x8, 0x6, r52}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r54}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r57}, {0x254, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r58}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r60}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x6}, {0x4}}, {0x8, 0x6, r62}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r64}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r65}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r68}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x401}}}]}}]}, 0x7d8}, 0x1, 0x0, 0x0, 0x13}, 0x24) creat(&(0x7f0000000700)='./bus\x00', 0x0) r72 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r73 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r73, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r73, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r72, 0x6611) ioctl$RTC_WKALM_RD(r73, 0x80287010, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') open(0x0, 0x0, 0x0) r74 = socket(0x0, 0x0, 0x0) recvmmsg(r74, 0x0, 0x0, 0xac0, 0x0) 05:20:02 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f00000002c0)=@raw=[@alu={0x1ad46f77e2853bef, 0x0, 0xb, 0x0, 0x0, 0xfffffffffffffff8, 0x8}, @map_val={0x18, 0x2de48873c0371a2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x57}, @generic={0x2, 0x1, 0x4, 0x5, 0x5}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfff}, @map={0x18, 0x9, 0x1, 0x0, r1}], &(0x7f0000e6bffc)='GPL\xfb', 0x1, 0x42f, &(0x7f0000000200)=""/153, 0x0, 0x0, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x7, 0x10, &(0x7f0000000180), 0x10}, 0x46) 05:20:02 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) mknod$loop(0x0, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) futex(&(0x7f0000000180), 0x7, 0x0, 0x0, &(0x7f0000000280), 0x1) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x101) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) open(&(0x7f00000000c0)='./file0\x00', 0x1, 0x40) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0x0, 0x0, 0x800000000}) sendfile(r4, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f0000000140)=0x8800, 0x8800000) [ 2257.439646] audit_printk_skb: 24 callbacks suppressed [ 2257.439656] audit: type=1400 audit(1574832002.989:4779): avc: denied { read } for pid=1171 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2258.551270] audit: type=1400 audit(1574832004.099:4780): avc: denied { create } for pid=1171 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2258.577087] audit: type=1400 audit(1574832004.129:4781): avc: denied { write } for pid=1171 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2258.671469] audit: type=1400 audit(1574832004.219:4782): avc: denied { read } for pid=1171 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2264.235682] audit: type=1400 audit(1574832009.789:4783): avc: denied { create } for pid=1434 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2264.263375] audit: type=1400 audit(1574832009.809:4784): avc: denied { write } for pid=1434 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2264.351517] audit: type=1400 audit(1574832009.899:4785): avc: denied { read } for pid=1434 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2264.396232] audit: type=1400 audit(1574832009.949:4786): avc: denied { create } for pid=1434 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2264.422317] audit: type=1400 audit(1574832009.979:4787): avc: denied { write } for pid=1434 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:10 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, 0x0, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:10 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x203, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0x0, 0x0, 0x800000000}) ioctl$PIO_UNISCRNMAP(r5, 0x4b6a, &(0x7f00000000c0)) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r8, 0x0, 0x0, 0x800000000}) getsockopt$SO_TIMESTAMPING(r8, 0x1, 0x41, &(0x7f00000000c0), &(0x7f0000000100)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 05:20:10 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18000500090000000000000000000000e308"], 0xc}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000040)) 05:20:10 executing program 3: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) r5 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4, r6}) r7 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r7, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r7, r7, &(0x7f0000000200), 0xa198) r8 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r9 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r11 = socket(0x0, 0x2, 0x0) bind(r11, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r7, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r10, @ANYRES16=r8, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r10, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r12, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000002000600", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYBLOB="40000100240001007072696f7269747900000000000000000004000000000008a000000001800000080003000e00000008000400ffff000008000600", @ANYRES32=r6, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r13, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1c}, 0x1, 0x0, 0x0, 0x60018981}, 0x4048060) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r18}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r21}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r23 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r23, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r23, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r25 = syz_open_procfs(0x0, 0x0) lseek(r25, 0x0, 0x1) getpeername$packet(r25, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r27 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r27, 0x0, 0x1) getsockopt$inet6_mreq(r27, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r8, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r15}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r19}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r21}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r28}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r8, 0x200, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r2, &(0x7f0000000000), 0x1c) r29 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet_opts(r29, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r30 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r30, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 05:20:10 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41c0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000001400)=[{&(0x7f00000002c0)='\'', 0x1}], 0x1, 0x8180d) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=0x2, 0x4) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 05:20:10 executing program 4: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x141042, 0x2) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000280)) mkdir(&(0x7f0000000140)='./file0\x00', 0x105) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xffffffffffffffef, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='rimfs\x00qd\x85\xe6u\xe4r\x80\x1f\xaf\xe4\xb4\xa8xWcsm\xf4\xff\x84h.\xee\x03\xd6\xe6\xf8^\xe0\xb6\x87]KA\xee\xc6pH', 0x2b44000, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f0000000480)=0x0) mount$bpf(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000580)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x566}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x6e}}, {@mode={'mode', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0x5}}], [{@fowner_lt={'fowner<', r5}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/null\x00'}}, {@obj_type={'obj_type', 0x3d, '/dev/null\x00'}}, {@obj_type={'obj_type', 0x3d, '/dev/null\x00'}}, {@hash='hash'}, {@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x128) write$P9_RREADLINK(r6, &(0x7f0000000400)=ANY=[@ANYPTR], 0x8) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r8, 0x0, 0x0, 0x800000000}) ioctl$KDGETKEYCODE(r8, 0x4b4c, &(0x7f0000000340)={0xfffffffe, 0xffffff80}) sendfile(r6, r6, &(0x7f0000000240), 0x7fff) r9 = creat(&(0x7f0000000180)='./bus\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r10, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r9, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r9, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @identifier="445523fb3e687d477b9be7c05887da85"}}) 05:20:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) eventfd2(0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea11020000050000", 0x28}], 0x1) setxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@v2={0x0, 0x1, 0xb, 0xad, 0xc8, "78aaa8ceadc9ed77d507260b40e6f4289f7e1fbb71f3c1c00c4d2fc2dc43678d8d577520cd3c46eb13dbed220f1338dec939c2e9a6267f05bb2d360f41c72cb72e24218150144a7746dcba8202af450cb68d39752550564b90b516c5ae16ca74480a9a155f9a7cbc1e9aa327e50a99a4aaca4a93019ef62c98d2a8e1be5d82df1ea881c05dfc3113fb45369fc3a5c6cc488277a53d480119942708af0ca0537c9b7dcd1259728ac7daae16d6a2d2f206510a5e99504a7476d67376410a02b2a43939113ee3b5c128"}, 0xd2, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000500)) unshare(0x40000000) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000400)) lseek(0xffffffffffffffff, 0x6, 0x2) r2 = accept(r0, 0x0, &(0x7f0000000380)) dup2(r1, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52b1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000340)) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000440)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000100)=0x54) [ 2264.858915] audit: type=1400 audit(1574832010.409:4788): avc: denied { create } for pid=1445 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2264.904141] audit: type=1400 audit(1574832010.449:4789): avc: denied { create } for pid=1447 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:10 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x1000000000012}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) sendfile(r1, r2, 0x0, 0x220fff) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f00000001c0)=""/191) [ 2264.927511] audit: type=1400 audit(1574832010.479:4790): avc: denied { write } for pid=1447 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2265.236158] blk_update_request: I/O error, dev loop0, sector 0 [ 2265.236359] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 2265.349666] audit: type=1400 audit(1574832010.899:4791): avc: denied { read } for pid=1447 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:11 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, 0x0, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:11 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000100)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x20000) bind$unix(r5, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x50, r3, 0xffffc000) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$int_in(r6, 0x5421, &(0x7f0000000280)=0x3) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x8200}]) [ 2266.004160] audit: type=1400 audit(1574832011.559:4792): avc: denied { create } for pid=1447 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:11 executing program 4: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) mkdir(0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@rc, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = accept4$unix(r3, &(0x7f0000000080), &(0x7f0000000100)=0x6e, 0x180000) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) unshare(0x40000000) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xd6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/member\x00', 0x2, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_netdev_private(r5, 0x89f5, &(0x7f0000000000)="49010fb4328c4e938653e4cc65dd9298bedbfc41feb1162703d7313b48d65e005b5d0f98") fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0xf8ce0a390af933f4, r4, 0x80784000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8923, &(0x7f0000000200)={'ip_vti0\x00'}) mount(0x0, 0x0, &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) 05:20:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x800000000}) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) 05:20:12 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="262fc9f95f090000d5de2c2f6530b3b18c0000000000000000000000399acdb37961dd7f537572a8b9bc5b33ff216435adcbb54cc3cbf9f9eb73fd2afbdf41bf152632be9c5d85c8817d45776672bdbc91d86e2fa5e181db91f07e70fabd8b221bd5658bac84ca2266"], &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={0x0, r1}, 0x10) write(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) pipe(&(0x7f0000000140)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x0, 0x0, 0x0, &(0x7f0000000180)={0x1ff}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) getegid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x121080, 0x88) socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x8000000004) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) ftruncate(r3, 0x1) writev(r2, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100060c10000300000000000000", 0x58}], 0x1) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(r4, 0x7014) 05:20:12 executing program 1: creat(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000080), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x23d) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x56d0e0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x200, 0x25b) ftruncate(r2, 0x80003) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) sendfile(r1, r3, 0x0, 0x20) 05:20:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16, 0x3b}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:20:12 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:13 executing program 1: ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) syz_open_procfs(0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='\ad=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c80"]) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0x0, 0x0, 0x800000000}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r5, 0x40106614, &(0x7f0000000100)) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) r6 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x10020, 0x100) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x18, 0xa9, 0x1f, 0xfffff6f1, 0x0, r6, 0xffff, [], 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x3c) [ 2267.905416] FAT-fs (loop2): bogus number of reserved sectors [ 2267.947946] FAT-fs (loop2): Can't find a valid FAT filesystem [ 2268.121319] FAT-fs (loop2): bogus number of reserved sectors [ 2268.194527] FAT-fs (loop2): Can't find a valid FAT filesystem 05:20:13 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futex(&(0x7f00000000c0)=0x2, 0x1, 0x1, &(0x7f0000000140)={r3, r4+30000000}, &(0x7f0000000180), 0x2) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 05:20:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x8000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000440)}, {&(0x7f0000000540)="50879d7cf189a13afdb3dda2b34f921a5d1ccb0423a37fd8981092a5d5588160ff70e5a53036f1a5521223ee01fae4f50ecab57e484dffa2d8b319b9b367ac1afd5ad0ee418612e99dee1a55e6c100", 0x4f}, {0x0}], 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x123}, 0x8000) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = creat(0x0, 0x1) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x4000) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000009c0)={0x228, r4, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_MEDIA={0x1c0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x285, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x14c, 0x1, 'udp\x00\xf4#\xc6\x14\xd5\xebil\v!>\xeb\xcb\x90\xf0\xc2H\xb6\xbbW\xd8\xd2\xf3 \xbb\x8ck\x7f\x85\xbay\xcf*\xf2\x10@\xa6\x06A*D\x15!\x14\x8a\x12,?dNW\x97\xdf\xba\x85wxq\x1b\x11\x95\f}\x98\xb1\xe9\xf1\x84\x8b\xa8/oT\xc6\f[.?x$k\x9e\xf6\x98\v\xa2\x1f\x8fH^\x86\xcc\x91\xbbo\xfa\'\tv\xd5\x852\f\xfbx\x0f\f1\xb4\xdb,pe\x8e\b\xc9*sp\xdc\xd3\xd5\xe0AH\xe8\x06G\a\xb2\xeb>\xc5\xec\xd3\xc1\x98\tV\xa6\xfe\xe2\xccV\xd3W\xf4CY*\xf44^n\xd9b\xe5%%b2K\xb3E\x82\xe0\xa0\x06t\xb7\xca\xaa\xe0\xbd\xb6\xba\xc2\x06\xb7e\xc1\xa5\x97\x053\xb5\xc0_k\bx&\xb3\xaf\xa9\x8d\xfd[F\xab\xa9\xa6\xab,\x944\xbb\x12\xa5\xc8\xcbI\xb0\xc3\xe6*\xe2W\x13\x05\x95\x9d\x98f|SQZ\xdaY \xe1\x15\x9e\x1f\xe5-\x81Q\xbf\xdf^J\xec\x00/\xb5\x0e\x8e\x90\xd3\xd5ct\x16\x05\r\n\xbc\v\x9b\xfbm\xb2\xe3+\x15\xd2\x98\x1a\xeb'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xf2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x200}]}]}, 0x228}, 0x1, 0x0, 0x0, 0x4008000}, 0x60000000) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, r5, 0x0, 0x3, 0x0) r6 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000840)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$revoke(0x3, r6) ioctl$int_out(r2, 0x0, &(0x7f0000000100)) set_tid_address(0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x8002, 0x0) ioctl$BLKZEROOUT(r7, 0x127f, &(0x7f00000003c0)={0x7}) 05:20:15 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r1, 0x1, &(0x7f00000001c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200), 0x219}]) getsockname$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x10) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, 0x0, 0x8800000) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r9 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r9, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000200)={0x0, r9, 0x0, 0x0, 0x800000000}) r10 = openat$cgroup_subtree(r2, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r11 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r12 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r12, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r11, 0xc028660f, &(0x7f0000000200)={0x0, r12, 0x0, 0x0, 0x800000000}) r13 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r14 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r14, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r13, 0xc028660f, &(0x7f0000000200)={0x0, r14, 0x0, 0x0, 0x800000000}) io_submit(r5, 0x5, &(0x7f00000007c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x3, r6, &(0x7f0000000280)="a02950fae18cb6c378e81965139b41906c4c34fb45dbf1df7b3e545045f6f6aec6a45f92df4d801eccc4c5ae9e8bf175f5ea3c1bdd360f3506ace7d8bedbd66303a5b31a972a35a4acc5b177f9ed3b7af51df582deadfac755f56c8de843bafe4e01afa24ccfdc5ca73af91e0dd01af19946a61233712e58d0c0431cbf6da9120c2a111f1c09237964f16819c04e13b6559edf21fdf1f3c7", 0x98, 0x5, 0x0, 0x7, r8}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x800, r2, &(0x7f0000000340)="f696cbe6d4b742c559792e1d9331dcef268a9d6a22acf80b5855634b1e83605bd81962843186dffb69d128c1bc4abe90bd707919", 0x34, 0x20, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xb, 0xf800, r10, &(0x7f0000000440)="b41064e27a1e1aee47e525c4d8436dc6c33bf10ce5142b53d3a5ba52290a6bbc1674d9c86d51cf203f8fe6f3b6c5263abad9c7b8ef6b788cebf9d76ccd7a0d8e8ddb395136b69ca99869269f4ac5e43b159aec92e865bed3650b50db4537b8d54c4ff898ccc114fdfb23e4342ddf47ec6eea0336e91714006da59fde67076e9ff70b400beea018f893af", 0x8a, 0x100, 0x0, 0x2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0xa, 0x8001, r12, &(0x7f0000000540)="08a578d9770d9873c7105b6e2b6a0af9593296c91a9146abff62e1107260525190ee308a7ace346780d401b65b23d60d5155aeff23d019387e6eda304a9eef99bbec10cc3a44f995afc3d336e0f8fb9d53300b7c56d2bfb624f5d220cde79f459058471599bb0627fe85a367365bde1504ff964d835fed3a23402cfed137a82cfd5bd950fca23fa07d019b77f2575589722908461ca8048e3aef2aedd3e60db6f3a880bf6e92dfa448bcff88a0059aa977358c28f0bdb2bbc0269201b977d9c172eef524d9d9ae07", 0xc8, 0x69, 0x0, 0x2}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x4, r14, &(0x7f0000000680)="0622a1fd3d83b054095611bd1daf068d3e61fd109bb53bee78c47d5b28505a7ae46e1885b985b0ee45dbf99447224dbededc8ca322734e16397b39906bcaaeba4ea88beb857b10d08ae69a6ae8ae6ad2e7b13f0606e7656dc152a9d4e4cd7649bd4d7c749a21d882fa63a9aff0d65509732b6266f4f56b6f14533ef03358016368895eaf9713ab32ae60d2d55c3a2e9b88f06415e608771039fa982c19b56fdb24db98c7a329b38c80f372c81d0dbcf393639aa22e11d8cde73ee2caac1b64ded0116b462db1bb1265bfc5ece70de516a9eb823e69c270e009104d54c6f4fbfd86d2c3bbab9104e03a81ce", 0xeb, 0x7fffffff, 0x0, 0x1}]) 05:20:15 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) r5 = dup2(r4, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="b8000000190001000000000000000000fe8000000000000000000000000000bbe00000010000003d436694000000000000000000000000000a00000000000000698d510762ada7d5ceb3282c22bd739756ac3d19e5c116d7edaf38c17f339d8dd369d475b5cafeaa7f34d1327a02408c75c4ae166340ff7c64151c9ebcf9ed5078da10f97c339c498a871811baf7f69e99", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004edd5b270c57906c7d00"/112], 0x4}}, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000400)=0x1) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f0000000980)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x5c63153a57d08e7e}, 0xc, &(0x7f0000000940)={&(0x7f0000000580)={0x3a8, r7, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xf4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xaade}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffcce}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0xf4, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x763}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a7c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x190, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'erspan0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x2, @local, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x9, @local, 0x64}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x401}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x596c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff801}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'vlan0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x40, @mcast2, 0x2}}}}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_NODEID={0xc}]}]}, 0x3a8}, 0x1, 0x0, 0x0, 0x4008140}, 0x1) r8 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r9 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r9, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000200)={0x0, r9, 0x0, 0x0, 0x800000000}) r10 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r10, 0x8, 0x70bd26}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r9, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2002000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x28, r10, 0x2, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2040080}, 0x20040800) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@local, 0x800, 0x2, 0x0, 0x0, 0x20}, 0x20) 05:20:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$inet_int(r2, 0x0, 0x32, 0x0, &(0x7f0000000000)=0xfffffffffffffeca) 05:20:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141000, 0x128) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) recvfrom$inet6(r3, &(0x7f0000000040)=""/231, 0xe7, 0x1, &(0x7f0000000180)={0xa, 0x4e21, 0x2, @mcast2, 0xdb}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)) socket$inet_udplite(0x2, 0x2, 0x88) r4 = getpid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c00000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001300", @ANYRES32=r4, @ANYBLOB='^<'], 0x3c}}, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) r7 = getpgid(0xffffffffffffffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={r7, r6, r5}, 0xff1c) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3b) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r8, 0x0, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffff0) r12 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r12, 0x202002) keyctl$chown(0x4, r12, r10, r11) getegid() r13 = gettid() ptrace$setopts(0x4206, r13, 0x0, 0x0) tkill(r13, 0x3b) ptrace$setregs(0xd, r13, 0x0, &(0x7f0000000080)) [ 2269.788077] audit_printk_skb: 24 callbacks suppressed [ 2269.788093] audit: type=1400 audit(1574832015.339:4801): avc: denied { create } for pid=1563 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:15 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_script(r0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000c40)=ANY=[@ANYBLOB, @ANYRES16=r1], 0x2}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) socketpair(0x0, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') accept(0xffffffffffffffff, 0x0, &(0x7f0000000740)) creat(&(0x7f0000000280)='./file0\x00', 0x1) sendmsg$nl_route(r0, 0x0, 0x20000004) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sync() write$selinux_context(0xffffffffffffffff, &(0x7f00000002c0)='system_u:object_r:klogd_var_run_t:s0\x00', 0x25) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r2, 0x0, 0xfffffffffffffdc1, 0x0) add_key$keyring(&(0x7f0000000900)='\xac\x82\x1e\x88?\xf5D\x9f', &(0x7f0000000940)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000000c0)={r2, 0xb9, 0xb}, &(0x7f0000000200)={'enc=', 'raw', ' hash=', {'sha3-384\x00'}}, &(0x7f0000000300)="fc5a1ddeb3d43ebcb0192dc69c44f8de203dd40c52772af884d3b428069fa4fa72f032f1ef0729499ca0c9f5f76f9840b8e243625b8aa49b067c81e03d295f62922714fcf5c06eb983eadf3debd5851399d7c3620b38289920a806bae170b205439b10c68694ae3b12d0df25adc6ce1455fa630d8b0a4763fc06442db086392f6e01200ac9ccc7866ee137f8a4ccae4738c6676b3b031ed6a6d283dcad834ef8ba156ca6d3507070dfec7d93d92daa5f45e1435840db175e4d", &(0x7f0000000100)=""/11) execve(0x0, &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000001ac0)=[&(0x7f0000002100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001440)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', 0x0, 0x0]) [ 2269.863317] audit: type=1400 audit(1574832015.409:4802): avc: denied { create } for pid=1562 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2269.886949] audit: type=1400 audit(1574832015.439:4803): avc: denied { write } for pid=1562 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:16 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x4, 0x705, 0x6) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0xffffffffffff1585}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0x0, 0x0, 0x800000000}) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) ioctl$EVIOCGABS20(r6, 0x80184560, &(0x7f0000000140)=""/93) r8 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r9 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r8, &(0x7f0000000600)="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", 0x200) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x3b) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r10, 0x0, 0x0) ioprio_get$pid(0x1, r10) sendfile(r8, r9, 0x0, 0xff7c) 05:20:16 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2269.966336] audit: type=1400 audit(1574832015.519:4804): avc: denied { create } for pid=1563 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:16 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) chdir(&(0x7f0000003440)='./bus\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r8, 0x0, 0x0, 0x800000000}) r9 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r10 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r10, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000200)={0x0, r10, 0x0, 0x0, 0x800000000}) getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xfffffffffffffe96) r12 = socket(0x11, 0x800000003, 0x0) bind(r12, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r12, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r13], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000003480)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) ioctl$sock_inet6_tcp_SIOCATMARK(r12, 0x8905, &(0x7f0000003c00)) sendmmsg$inet6(r2, &(0x7f0000003a80)=[{{&(0x7f00000001c0)={0xa, 0x4e23, 0x100, @local}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000480)="3323fa9e4ecda5dc7fa90bb35f95b937af8d8172520da0b4ce86f1dccb9b0d17aa4996bc90ffe616e9714252242400be71ba9846059b12c5774a70cc770253f365daf8e3c0426ffd9760ee30952cc7ea9df625e3360df0cb75ec999a325dfba9c7304d3aee99ef88bf99e5dec684bad1527e0db779947498f854dd090713d47bf9900b534fb7f30d7dcb01a233b5ae8f1fc7c92d265d", 0x96}, {&(0x7f0000000540)="d46a1a74e61aa9a53024af6270f1cb765eadcf984deb4131e1b3975768661f65315b2c505cc743ecb18c8ef5627e0b86203dbd93f637b4b8d86ddc0d9500e4f088e8d27aefc158369af1d2ddd2d342de39dc1a164603265d2c454d9aa7ed55854d58a97a3f0e3906d0784a4891cf0ec22704ddf9ed0d20b0175ffca95c61a2714d478dbc6cbb69280bf4859d12a6fceb1422449497ee23b68e8039fc32e8ee17b3f6097d929e84c7f0aafd5f", 0xac}, {&(0x7f0000000600)="e1d8ecbd75d8a379b0fdb9e4aa9a6da36605e6e37389a535f5175211f1a71aa845db2e18ac69d02116ff38bbe202dea65506c01bbb8d3413717c03975f868e1a01d16d41430819d4a27dbcf82a5f208aec69051da0c56ab37ff3ee770ccc1811b20706e1dd53ee71b7c14b890ba8250f", 0x70}], 0x3, &(0x7f0000003cc0)=ANY=[@ANYBLOB="800000000000000029000000370000002b0c000000000000040102c204000007ff0502005004010707500000000912070000060000000000000097050000000000000002000000000000050000000000000076af0000000000000180000000000000d400000000000000ac0b00000000000000000000000000000401ff00000024000000000000002900000032000000ff010000000000000000000000000001", @ANYRES32=r11, @ANYBLOB="dd000000140000007550000000002900000034000000d000000000000000"], 0xc0}}, {{&(0x7f00000008c0)={0xa, 0x4e21, 0x8, @mcast1, 0x100}, 0x1c, &(0x7f0000001c80)=[{&(0x7f0000000900)="77ed4c72b846792cc154c2768aa51f915ce82e36b8fab3ba807b6bacbbc9bbc819c7179758e440bc4ca6cd0ac20833714b0664719de54496fc7eaf9a607d3b9a5cb7ebda9a9b4967af08aaa5d72485fc", 0x50}, {&(0x7f0000000980)="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", 0xfe}, {&(0x7f0000000a80)="be0d24ef9da41ffdb7c8cb9fa5dd692d644ea20ffa13b5dbc0df3d01a087eb69f261d803bee5c9714d551848812cf467039a75e2f988c2641f21e9df864961dbf14a3eee502d6f1b2b3878f64b901cca983af5fbf115f03d5f088ae19f620c444a1ff144b1b32eec5c5a4e0e7d26c7be275f9cf3e29513d481a4a706c1b194fc1340a383c25ec98544d905ece96d014c8b595a5f7362dd96341ed1792941a3359ab2d03fe60e1674b6a79c09013092ece454be5c1d0eaa7f09a89d174e29b2c937759d63c71f2c59eba08231a86f0b677bef", 0xd2}, {&(0x7f0000000b80)="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", 0x1000}, {&(0x7f0000001b80)="338cfaf7cd3b5a0514ce62ed65d8e7c595e6325fca28b9b8237abd32e2fb5c705ef0dd83e34a173c1af2a555c630cfe9679902da7929afd110c4d82f8ce1bf91e53782e34e5222ca14f9862b02c8b2d25e742a330be5c227c427c301a7a2b3a2b7f680e5bdbbd07869e6b022ddc3f2b4fab47d59bf9b5569017c556f1ef42adb79908a7e778afbecd105076117f5b8dc7d7ce825140bb336c37590c3f5a42ec58ab50c1495cdb60e611c519dc68001a80f86e56241374eab7724eb8372978482767093d319fd45e142dbe17316eeaf10d26db9c96f47f777db4ebdce55127fb21826eba394db4e2c50d9849b46a9494ab7935f5c", 0xf4}], 0x5, &(0x7f0000001d00)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x75, 0x2, 0x0, 0x8, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x40}}, @hopopts_2292={{0x68, 0x29, 0x36, {0x84, 0x9, [], [@pad1, @generic={0x0, 0x43, "773ba9bab26e6c618a9a4087797a9a802abbc64de0dd3526a3ee1ecaf1cf373893038e8885f6d08296fb746876a0988a4b4d6b601d208b057192e3a0868f174a521252"}, @enc_lim={0x4, 0x1, 0xa}]}}}], 0xa8}}, {{&(0x7f0000001dc0)={0xa, 0x4e24, 0x9, @local, 0x1f}, 0x1c, &(0x7f0000002480)=[{&(0x7f0000001e00)="df05518a93e4", 0x6}, {&(0x7f0000001e40)="ce508a5fcd6ca44981bad55154a0b06398df1f1dfb0911f0ebf47c3a61a43bf0db5e9585981c9c04b03d36cc542d45b9e9af64b68794a8087201d682b0242a3ea0c27918c2744f1a68ce0a2986f8c51f03a51fb16797732c77d888aa1b7b43e889117fe787f4227aa314946442addda6d8df1b214de6cdca053ccb426632bd16c7bcc124b930dd69a93fce77d68fc01eebfc1808f2c3775973b1af10355fe219db008a9a12f9e7bf7ce68bb163934bfeb675c2fc6ab3bbe7ae9821abc5e89c729298185cea725ca96a5c905b9bd66bc0430471e61d4f038662e1f1d47e0a7262618e2c45c5deb45d3403c56c6e68a2cd1f40fa9e", 0xf4}, {&(0x7f0000001f40)="b53c84a0839df78cbe3cb3d18cc15023ce91d8affebd178fd0b6f515b223ce1446fc2372cbd1395d6c33104905ce1de6d5e2a0ee31b7ba64d745455f12db073a902f8bb7c757d2a4cfb5d6806abee8ac9ec14f7f536bd53935f1d785efa9856af4482d58c0359b8e93d511063b02055ef32d1fe80f8f7dbc7a363488a3d20a66bafe258b05f816c6dbecb921f602c0fcbc7a160e38fc30a2050d3f980fe28785efe85c57f56279249c6d174cf28c8e0a20a2be68436f910c12ef7bf27f36f0", 0xbf}, {&(0x7f0000002000)="f2c186fe2b7543c9e2143100fa6b300ff068f1935aeb7042635931d9bf7567e13aedd01c900aa6cced893ccba7f0e8a09ca70982a44de99d0b49dfb432403ff8748b3ee608e9cd88e68edb7cffd063a35a4f9153d42f20c2cb3b578392d2baca0641269f56a1db1e225632d2aed485d9e0c4f85ae984b07f8630d2f3fb810033b40b7c595b2bd3c01f37da45af842d4b7ba6ca05c2ec8d8c4711a58bc4c7b2ef4ce263d756ca07867c37535b4dceecaf1d7fac60e5fe2673f52f014414f54ae7aa5a49b4cb6e98d9ccba21c06f0f17f734f1df333d", 0xd5}, {&(0x7f0000002100)="5070a88babc96fbd5198be5d266e43c787575a8431a1eebdf385deee279827418cc9b489ffba81f92b6884bfb27995246e637974596a2b7d6a560433dcd14d22e4046118cec5716dda32ce235070b32d04871361b6281ea7b0b1c460ddaff5a3e5f67c004200649950acdc6965bd29ea27a55cd99cf1bc258326eed232069f434be2f88f38e67ffbc506", 0x8a}, {&(0x7f00000021c0)="47c1b8da2826cadf3b3d165a61dcfd0a17e4df8f087482d6353667cab54202cd4be53fabccf6b1a759b503f9207ae5fc294b13babe02840464c0b1ecff43c1928129415dd4d2f5af93588a9f4a9f7a672781fd9c2e5a216f94cb0f21e950e6be523237bcfafd1f2be9d8ead5db110418a2b4dd38de9629fbff3ea2aefb49b1d70c84860bbb2f90384a8abe3ca40494975c601a4d7600e0ee25ea1b16b3ba797cbb6e3948c7cbb9e8f2e8a1e13af8027c2db0caad123684da136850086f4f1afab7bd0743db0721148b3f877b132effc6557ef2c6136a9ae7a5107afea5133d85791c0defd7820a0a63a32202941b6d", 0xef}, {&(0x7f00000022c0)="a4dca7dc4c6104c7aee70a25194775d082577de3f2fa68f66f63b6996f66608a25120b01e53f471d77042b7d6d07b1e4d269cbd41b73bed6d20ed437e650b6e8f1898b8028f1e6512a8e370782cecab231a2953a025567081b007e5218f0b243f57cb55764c8695d5ecbc5eaf61b4245a453cf0109f5f46dacd41a433a6a6ed1b9688feef9a02b1d8cf652356d2fec63d415132345ad284bb94979010c9e6599cc98b146f358ea39d6a0a07c5b", 0xad}, {&(0x7f0000002380)="dc51a0d24daedad4089ac213a078a32e63684a0be0af32da92fb2aefc47014077c84ced2a593f10b9d42e7a38ceaaa420e78ec67b2ea834890203a71556d091d054920979b3cd5630300dd933bd6adbba8d7a36182c58c5cce8b8653cee70b9c1b07561b36b78d823105eb3e02eb9597b587b895b1b76cd6d1a232daeae0198d8ead256db70d5eeece28c88c5b1dfd54c9c8e6cb161cd758277fea3e9ca479a01096e5641d1aad0cd5517c0a39896e0dfd149a2573e9d463cd2215f8425fb26b1e1da37f37a00580b8c0a8c2f50d0022d4adc751d73f2c5c3861161c108650ae7d86", 0xe2}], 0x8, &(0x7f0000002500)=[@hopopts={{0x110, 0x29, 0x36, {0x4e, 0x1e, [], [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x2, 0xb9, "8d3a938dc8a6f7a16aa6f687b175d821401ae382e09b7f0bacc242e27aeaf6f1eba9d2f3abdbeb5e666937c9871caf6e0d2f076624f2405a1bf7cda4d194b9988b997a996f314ec9a77da0fd7541853525cf08b2cd236a7c4a0086c126f179b6ba5710f744e60370a35d4a75ad2d3e088488cffc98d5492e3ddaf5491fdd8aa1540638baa89cdb908ed9a93cf7f451e4d031a0405e0b53a117c0545d1ed9ed733c0611d4390b44a14bf1d679bff95bbb9a58b314521d7db872"}, @padn={0x1, 0x1, [0x0]}, @pad1, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x885}, @jumbo={0xc2, 0x4, 0x3}, @jumbo={0xc2, 0x4, 0xfff}, @hao={0xc9, 0x10, @local}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r13}}}, @dstopts_2292={{0x50, 0x29, 0x4, {0x4, 0x6, [], [@padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @hao={0xc9, 0x10, @ipv4={[], [], @local}}, @calipso={0x7, 0x10, {0x8, 0x2, 0x60, 0x0, [0xfffffffffffffff9]}}]}}}, @dstopts_2292={{0x88, 0x29, 0x4, {0x33, 0xd, [], [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @pad1, @ra, @enc_lim={0x4, 0x1, 0x7f}, @pad1, @generic={0x7, 0x48, "7fe134a9146d3ebb3338047428faa3cbcccf888b33907c912a42571055548ecb328119be8cdc7befd1cea1bea8cc8fe47bd6858c037aeced6431486f6a8c1904246ceab7a92ef08b"}, @jumbo={0xc2, 0x4, 0x1800}, @pad1]}}}, @dstopts={{0x208, 0x29, 0x37, {0x88, 0x3d, [], [@calipso={0x7, 0x48, {0x400, 0x10, 0x8, 0x8, [0x4, 0x1ff, 0x2, 0x1ff, 0x3, 0x5, 0x800000000000000, 0x26]}}, @generic={0x4, 0xab, "8676985a91e3e30e3f7ddda7847b6e7d3221b86e14adfa4f2725245d65fec69998a237b141cc82a5ebb92678432c2475ca5ffb05a472384978fd7c9ad2f8e7be2719eae24f9b57740c6b0a62500ee1051d0289c0771c78f92845c001843a06ed35e38abc3b12658d51642f98a4c6a72e62a5bf0b702021c36b149d212594cd7941574f3aecae445753b85e34a5ea2c76858ad21549dc5910868909607af3ebffe53b90984cc3c4b772cf2d"}, @padn={0x1, 0x1, [0x0]}, @generic={0x6f, 0xdd, "3b6d92d95eb2229ec70ce39effcdcdb2d3cb3346dedf6481c44659c0f84eb860e1492e3d6f9ced1488ffbb0137e7a81795a9e98a726286bddba3ef538b5d74d8223a1fbfd6a2cbf6324dca655b12914f4e29462d11db6a5e2db5b11eb1205760c4450b8bf7716c37d2aed74a7d15c2d7ea904ec4bc46a456002d0f45ce55481006526040831e913a928e6730b78a56bf21f4a21e5627543c332e0b2a7fcae7cff81ec32a37fe5ed6b2128e7c43e6c9ac6eccfffdb5545721a679797a0c7455be53ed9df7875c72aab01ad845d029dc345cdd4781cd871c4627cfded722"}, @pad1, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim]}}}, @rthdr={{0x88, 0x29, 0x39, {0x33, 0xe, 0x0, 0x1, 0x0, [@local, @rand_addr="f42226bb4fc78273206159fb45e71228", @local, @loopback, @local, @mcast2, @loopback]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}], 0x4b8}}, {{&(0x7f00000029c0)={0xa, 0x4e22, 0xc101, @loopback, 0x20}, 0x1c, &(0x7f0000002c00)=[{&(0x7f0000002a00)="3fd437c3f5e98edd46a7097780d0bb825ecb9005272f3b295858f5176bfa8d1bab8f0e23bb3df57c9b561bcbf25400ff8fa26729a8e12cf4efe2fd713b1d1d096e866149b51fd612fb047551319a7ae30ef785499b0c2e37b0e2602e32d3dbb2cb889d0d63d8264cd6c647a5a57c90f76a80a2293d35f0d2932a65fb7beef0c4dd2aba468e1941787a65e023acd23c09ab1f7cb808725431d8781a7ab546446011b12d727a2ddebc020db4", 0xab}, {&(0x7f0000002ac0)="df24d59ac324f072f14b3b20118607b0e47f6474139dfed481ea775b939240d88e4322c22bf5a0465f37c4dc745b4fec61b8a935319657801b29ddd440a5ff88f56ae604d28d2a5e29cf3473463be7fb5ea494f11920839727072933c9", 0x5d}, {&(0x7f0000002b40)="1205b935861d55d324fc6f1f06bb991e98c865fdcb5ed3da02075d9e37d47bedbfd4746b875ddb1b1f3faad9c5b8b806dd00bb90d94fd1bf76d6dd7a555ff7f8f8c1f9c111bebd8e421132bbdb171d27cdc7ae735398daea5a577eddf43b9990009064e939be65c39d6b5762beb912dc4f3fceb4feb7eb141f812057e7aba0d2ee1dd323f90f8e9f1f94d8bae8ffb5e665cb70dcd7070ec79449d3f7cf41cef179726b3c31f75a4926fd802c44b3e0b00ff1b251dda9ed9de1be", 0xba}], 0x3, &(0x7f0000002c40)=[@hopopts={{0x18}}, @hopopts_2292={{0xd0, 0x29, 0x36, {0x0, 0x16, [], [@enc_lim={0x4, 0x1, 0x2}, @generic={0x1f, 0xa2, "3d7e45aafc78961431978158ea68a877c68e52cc986721d4ceb7ed7c4b5630d9485c80740aea83d5157b1e8b615009dfeaf6f4cc73bc921cc9c08eb4091178f9df4b37a179dcfa78940d4d10f3264559a2a2187049445c01ae5d253dd5002147320af2d4c131210b37cd1850b90409bb87564d91ca3c6ba43896318506a84c6c88b83b325be8d8aa2c933f797ac71614b2b073f55f3627acab1f730cf5fb5b3f38c1"}, @ra={0x5, 0x2, 0x7}, @jumbo={0xc2, 0x4, 0x5}]}}}, @hopopts_2292={{0x50, 0x29, 0x36, {0x2e, 0x6, [], [@generic={0x9a, 0x2f, "64b21b994d0c19992fca74c3f62572143dff442b34250115a9a444fb094a94d08195fdc4c8d1ea2f71a77a72557a1b"}, @enc_lim={0x4, 0x1, 0x7}, @pad1]}}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x8, 0x1, [], [@ra={0x5, 0x2, 0x400}, @jumbo={0xc2, 0x4, 0x7}]}}}, @dstopts={{0x20, 0x29, 0x37, {0x2b, 0x0, [], [@enc_lim={0x4, 0x1, 0x9}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x101}}], 0x198}}, {{&(0x7f0000002e00)={0xa, 0x4e21, 0x2, @loopback, 0x739f}, 0x1c, &(0x7f00000033c0)=[{&(0x7f0000002e40)="077bbbcf033a8a8ebb8936d2f3574689870c4c4bd63f8beb84554f71afbdbcc092f0653db322c93ee36773416f3677e3be6fd239c7e7b330b367332af17ca6512dbcbd90c59f29e738d4512b10e4bb20dd86854e705d6e1c4edbdacc48dca7bef7cc7a80a010295e9e4d55ca1d", 0x6d}, {&(0x7f0000002ec0)="48714df5fb2017a7d0e8111a9ae911872be6b7eb13986fbb85af660feee789b97dc01bc27ed41eb5f32a3e7176e4d67465294166f779e7168eff5d6f957e222070be921539082e35c7af576deced5f8281e4c67eb1752e700d662fff5f91cbd05dd52342ebc15882c3b3aec1c90d5dbc664876280c64119fa02e625b70d97285da8e51bb2f626214bc4f1b3f44e5a619f5b6560538f9fb4624ff0a9e07c74e3fd3e5a4122dfc1a0a16ae465e407ac6297a8bf6d5f4f1a71d3f5629f2af2e0366bc0a877a6f4ba422284c10eb08fd88447b2691a7087ed52f7b09980d734dfd1b5b183f93a640be", 0xe7}, {&(0x7f0000002fc0)="dd311507d987949919a11831ec22266053d3ac94134938d3c7f214ad5e3951c593ae6dc08ac1308ccd4ea35946547dd10a584da5dce6495d07c222e0b0bf758ab9229745341a84b92bbffa1505a4bc9b76aafa2e1f09cf4d02ec928bb861915615712145f2177fa6e53ec1597b3a2ac20a97a6ae608d338ff7a35d93ab0c17a67e390ec4af94f326", 0x88}, {&(0x7f0000003080)="8ff6c531f31860dc625b6ad60078419ccf5b3612b46c61a09c0d9786ef37f5002a6caca88dd0b13c08ae78032527fd7faa4e766204de7a13f079839128b39147b6b03f1ab8e37b0114e259b93dcdea0abd8ac7b8067d2f6d65c6c3c6ffc67da0521098f441927565dd405dea716cd75172f9e79d39511423ddbb049616e743ce30cf793d7f5ad0885c916093e0e4efe1a41c717775d103916954a53a9d117b", 0x9f}, {&(0x7f0000003140)="42a1c50602e5e4a3483103c694355789f9bcb1fcfbd5f3f60aa206edcd624bc8e893c7b5c907526511a109089c1d6831547f9668be87a1ed17d64acea2fcbbe957afe62033e2732c3a89cd9be15fd9004c233bdda580b7368c74eb7a0a3bcc4f31bb7db66c20977d2c540ee812d4be45e9ef70658e44b3d7c093176670ba84e6ea366f2301dfc2bc7d56190471fd2e5f335c00fabc9f9c8b2f5ccaa4d973ae1b5bdd92033e0bdec1d659b46b9f53a03874f3c979ad895fd149a13065da4f1b5d2af61a62ee09dfeba15217bbf5e00266cde71080d75b0cf636134177a5d04db91ee7a7d758dc711c8fe93b", 0xeb}, {&(0x7f0000003240)="e83be62883dd9b4a4e860bec8ab5d9e188c25cc7a168813195cf11b0c11880c6b900148eb1b10f006d281f6ec2aacf130b87050354be6f49d30f5122e29994", 0x3f}, {&(0x7f0000003280)="117170f8cbd1e1dafaabbaab21cd0a8a57b4d36a14539bea25eb9d3de2505af43b1c42958ef46c355dc7571b3f3aa52e7d1d2d942a4a5d9e7fe97cae9cebeb8bc5bc749f4db155b202e67fcee227da620185661b5fbd64bda70e9604f8fb73e577404ce04546d2da3c233c57c6ca78698af66797a06b002abebf536d026c1fba32025bcb1202ba72b4fcecb30a2f49656a670c2a5510e4c9a7491a7201aaaa516fdf627b028a167772908a0dbb204caf0f5ab8c2bcdf0984fa5b3b3ff74f1ec41b22c522ea4955f5adb79ccd71cbf027569e0cfedfb02da74048ba74c0966c507a6245d1d5e6f8599611773fb8d3d752f555202717ec40cb1391db99fc410c", 0xff}, {&(0x7f0000003380)="5469e14c05d7a668092667c4dd9a3d91cc40802762416eda90aa8cc5e97b02cd86d6fc7ea84125c3fc1952c13c9c960123447a7298b566608dec5197c49f", 0x3e}], 0x8, &(0x7f00000035c0)=ANY=[@ANYBLOB="14000000ffff000000000000430000000600000000000000980000000000000029000000390000005610007f00000000ff020000000000000000000000000001fe800000000000000000000000000018fe800000000000000000000000000018fe800000000000000000000000000029fe6200000000000000000000000000bb000000000000000000000000000000010000000000000000000000000000000100000000000000000000000000000000380000000000000029000000390000003a04000300000000ff010000000000000000000000000001ff0100000000000000000000000000012400000000000000290000000000000000000000000100"/264, @ANYRES32=r14, @ANYBLOB="00000000280100000000000029000000360000003321000000000000c2040000007f05020001010400000000c910fe8000000000000000000000000000bb00010001964694c433dab5d19aabaecc6c1fbb3aa43a06d5f88223e376df5408806a49fa2ad9cc16ad46536995c1e1911e654f00c3c2c06e688bcfad6d2ef890698b15874543a4350708914eb9f1e6db7de00cc2502a47b23245e89bb724290b5dff5c1ec9a33fed89723d2e9289241f6c5730e8c5458f853c0f887b11120eb710e9f6d6b0e3b50302773debcf67312ebf885ba920e6d7f3ef743007380000001f0c014000fbffffffffffffff0300000000000000010100000000000007000000000000001f000000000000000004000000000000040105c910fe80000000000000000000000000000c00000000500000000000000029000000370000003a06000000000000c910fe880000000000000000000000000101050207ff010a00000000000000000000c9100000000000000000000000000000000100000000140000000000000029000000340000004fd3000000000000"], 0x2a0}}, {{&(0x7f0000003880)={0xa, 0x4e20, 0x1, @remote, 0x8}, 0x1c, &(0x7f0000003a00)=[{&(0x7f00000038c0)="a910c7bef12d432b35bb888d6c6b4afef2c892d78ca8ddd21b9300d0880e164d9fee01f69c49174c5eaf02e956775661cfbf4e18b876edb6e86d5000f76602a889750bed00ebe4cb68259351b75eb8a64b6ec91f85b4ae4900c3079e0b4f4207f8a9cfd67715d4fa934a873034ca255612cf066471ca", 0x76}, {&(0x7f0000003940)="b843d6d272d87e698cff801f7e1193644b8181c4f73f21091b6d620ce5543061a776961dfcb877fce3c61d98dd37a74e6368befc69790e7f2af7a691a8b08ebd627d137e900e0fa6e0982c02505a80902bc45d6c6b0066365483011c3a048b772998fb9148e1d14a81c14d82ef21d33292dbd03d24d74e35c564e387d003810e399ef7df9dcd4898c1b876b21164e96fef1036ce02b442790c6b8d0486fbcfc031c673", 0xa3}], 0x2, &(0x7f0000003a40)=[@tclass={{0x14, 0x29, 0x43, 0x401}}], 0x18}}], 0x6, 0x10041) r15 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r15, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r15, 0x0, 0x0, 0x800000000}) r16 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r17, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r16, &(0x7f0000000000), 0x10000}]) r18 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r19 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r19, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r18, 0xc028660f, &(0x7f0000000200)={0x0, r19, 0x0, 0x0, 0x800000000}) r20 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r21, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r20, &(0x7f0000000000), 0x10000}]) r22 = dup2(r20, 0xffffffffffffffff) r23 = socket$inet6_udplite(0xa, 0x2, 0x88) r24 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r25 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r25, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r24, 0xc028660f, &(0x7f0000000200)={0x0, r25, 0x0, 0x0, 0x800000000}) r26 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r27 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$P9_RREMOVE(r27, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r26, 0xc028660f, &(0x7f0000000200)={0x0, r27, 0x0, 0x0, 0x800000000}) r28 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r29 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r29, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r28, 0xc028660f, &(0x7f0000000200)={0x0, r29, 0x0, 0x0, 0x800000000}) r30 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r30, 0xc028660f, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x800000000}) r31 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r32 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r32, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r31, 0xc028660f, &(0x7f0000000200)={0x0, r32, 0x0, 0x0, 0x800000000}) r33 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r34 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r34, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r33, 0xc028660f, &(0x7f0000000200)={0x0, r34, 0x0, 0x0, 0x800000000}) io_submit(r5, 0x8, &(0x7f0000005200)=[&(0x7f0000003c80)={0x0, 0x0, 0x0, 0x2, 0x1, 0xffffffffffffffff, &(0x7f0000003c40)="dff8e27d0c44595e18b67db4709491ced9", 0x11, 0x2, 0x0, 0x2, r4}, &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x3, 0x8001, r16, &(0x7f0000005240)="964c3279c2972cac77e9bca8b3c4d025c852e247ec2a096669f486d6c7fb7907db8293bf12a146ac3e43b1db07dc2367bb71b797162036503d517876b7f7df4fd1b5a9ed056dba91fa4dd3d6bcfa3e7aa2aa635d3602104d5459421c7d24fad4c3c3186c759eb032fe83e6747f89751c231f01648baa26845cf70d9fbd58e87438b0dee8df49d043b75a3bdf5737fb5d0a510c4ecf59f9afd42aae68f94e4075e66d67089a8ba60c93a89de0cc4d9368b605000000000000007d8657a28913922ce1c7666797c6308ab85d23238ac3fb48ff00cd5054d376dd3c3788dab3cc6bccca46d3b31381c9f1a963ef06f50c3033e9f76621c0d8a72c28941714fe44fe4dd56915b669d5c983072f49ae34e5d883c2e11e195d9f3296a06eb297dddff3ad403e5c0463e7d410abbef917d7967d404357", 0x133, 0x8000, 0x0, 0x1}, &(0x7f0000003ec0)={0x0, 0x0, 0x0, 0x2, 0x50ab, r18, &(0x7f0000003e00)="db0348ef8fec26eb20e0e43a2a02b93e5765cac143b44c3296bff6007fe6ca509e220ee0daebd708a7f2426519669262b962a9fc729ff57f14574d45fac56667e02f7bf49b6ab303a568da40a7a81f2e47cc8c5a484713cd7e9cb3960565e4350d40908bfbfeaea7db651b08eb5ca1ea595f20d296c779134f4f2d604d9f40609ee1721576ebef169d58d194a0b45ebb0c35147a93c39f8fbdb3e9c60c62db434c802af4ab370c58a752a082452cea97cb8e145cf1965f09", 0xb8, 0xbca, 0x0, 0x2}, &(0x7f0000003f80)={0x0, 0x0, 0x0, 0x6, 0x4, r19, &(0x7f0000003f00)="3973b3fca3a6ee694f8d4a270d2a5e9f8dadde1d9c0f8ec469fe909b414b542808fb688c0e9fa5538fa49d05c4087b7df234f1aa4022ce89b415f634f70421662bc10067a1a6193d58800f96c4a21d05352f", 0x52, 0x8, 0x0, 0x3, r22}, &(0x7f0000004000)={0x0, 0x0, 0x0, 0x0, 0x98, r23, &(0x7f0000003fc0)='#', 0x1, 0x9, 0x0, 0x2, r25}, &(0x7f0000004080)={0x0, 0x0, 0x0, 0x1, 0x5, 0xffffffffffffffff, &(0x7f0000004040)="bdf65e5674c6bbf97aae88", 0xb, 0x43, 0x0, 0x2, r27}, &(0x7f0000004180)={0x0, 0x0, 0x0, 0x8, 0x9, r29, &(0x7f00000040c0)="ad35a07894867f3084ebb195292895699d772638f58a6a23fb0027c7ec23f7e3a07e65a73fab1b23e46704f9affeada57cb480ee0f11f932ffcc400876c4282efa98144b612a84ad51040197db47117f835a376cdacd12bdad700cca89aa3f3293a0312d4f32194582baf0ad64d5fc1b15e19f576f857013ac79e4bc56f6fd06bb8b70099e155c34bfe09e8c7e5874208ce6388ac337070af0c3e24d9d90fc2105e01cf2c61239df85f766343a1f0c981397f68136b1d461a33b44", 0xbb, 0x3, 0x0, 0x2, r30}, &(0x7f00000051c0)={0x0, 0x0, 0x0, 0x3, 0x8, r32, &(0x7f00000041c0)="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", 0x1000, 0x8001, 0x0, 0x1, r34}]) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000100)) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00\x02\x00\x00\xea\xff\x00', 0x148) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000140)={0x1}, 0x2ce) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) close(r3) [ 2269.968037] audit: type=1400 audit(1574832015.519:4805): avc: denied { write } for pid=1563 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x6, 0x98}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000200)="41b4892f1dbdf9137b66dde38537f83f2eb1ec5b6537189d8b6ef139c5b85da5af932c41a64d8cb172d2c0a963a7d85861418a50bbab6958ce451d59dd725a9091b89b", 0x43, 0xfffffffffffffffb) pipe2$9p(&(0x7f0000000280), 0x80800) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x404001, 0x0) fchmodat(r0, &(0x7f0000000500)='./file0\x00', 0x121) mount(&(0x7f0000000380)=ANY=[@ANYBLOB='/d\x00\x00'], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='aio\x00', 0x10, &(0x7f0000000480)=']posix_acl_access\x00') add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000140)={0x3}) readlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=""/94, 0x5e) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f00000005c0)=""/223, 0xfc61) [ 2270.417970] audit: type=1400 audit(1574832015.969:4806): avc: denied { create } for pid=1571 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2270.450691] audit: type=1400 audit(1574832015.999:4807): avc: denied { read } for pid=1562 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2270.465538] audit: type=1400 audit(1574832016.019:4808): avc: denied { write } for pid=1571 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:17 executing program 3: getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '-selinuxnodevvmnet1]proc.-mime_type\x00'}, &(0x7f0000000100)=""/55, 0x37) setxattr(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)=@random={'trusted.', ']\'proc!\x00'}, &(0x7f0000000240)='}GPLnodev\x00', 0xa, 0x1) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000140), &(0x7f0000000180)=0x4) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) 05:20:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffffffe) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0xfffffffffffffff7}, 0x8) close(r0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x1) [ 2270.500612] audit: type=1400 audit(1574832016.049:4809): avc: denied { create } for pid=1563 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000040)=0x3) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYRES64=r1], 0xab) 05:20:17 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2270.502530] audit: type=1400 audit(1574832016.049:4810): avc: denied { write } for pid=1563 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7}]}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) lseek(r2, 0xbd9c, 0x2) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") read$eventfd(r3, &(0x7f0000000000), 0x8) 05:20:18 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f00000035c0)}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x74) sendfile(r3, r3, &(0x7f0000000200), 0xa198) r4 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r5 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r7 = socket(0x100000000011, 0x2, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r9 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r9, 0x107, 0x1, &(0x7f0000000080)={r10, 0x1, 0x6, @broadcast}, 0x17) r11 = socket(0x100000000011, 0x2, 0x0) bind(r11, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(r9, 0x107, 0x2, &(0x7f0000000000)={r12, 0x1, 0x6, @remote}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r6, @ANYRES16=r4, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r6, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r8, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000002000600", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="40000100240001007072696f7269747900000000000000000004000000000008a000000001800000080003000e00000008000400ffff000008000600", @ANYRES32, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r13, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1d}, 0x1, 0x0, 0x0, 0x60018981}, 0x4048060) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r16}]]}}}]}, 0x38}}, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r19}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r21 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r21, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r22}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r24 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r24, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r24, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getpeername$packet(r26, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r28 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r28, 0x0, 0x1) getsockopt$inet6_mreq(r28, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) r30 = socket$netlink(0x10, 0x3, 0x0) r31 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r31, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r31, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r30, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x300, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r32}]]}}}]}, 0x38}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r4, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r16}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r20}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r22}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r29}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r32}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) close(0xffffffffffffffff) 05:20:18 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e23, 0xfffffff9, @ipv4={[], [], @multicast2}, 0x9}, 0x1c) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0xfffffefd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000002c0)=ANY=[@ANYRESHEX], 0xfffffffffffffce4) fallocate(r5, 0x0, 0x0, 0x8020003) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r6, 0x40086200, &(0x7f0000000380)=0xfe16997d0ea17aeb) lseek(r5, 0x0, 0x3) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 05:20:18 executing program 3: syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x86ce3a51aad66567, &(0x7f0000000280)={[{@fat=@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 05:20:18 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$TUNSETIFINDEX(r3, 0x400454da, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000000)) 05:20:19 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 05:20:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x15}, @generic={0x2, 0x0, 0xc, 0xea, 0x101}, @exit], &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0xfffffffffffffe60, 0x10, &(0x7f0000000000), 0x10}, 0x70) 05:20:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x800000000}) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x40000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x37, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000480)=ANY=[@ANYBLOB="b8060000190001000000000000000000ff010000000000000000000000110001e000000100000000000000000000000000000000000000000200000007000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000538a3bf600000000000100bdb500000000000000000000000000000000000000000000000000000000000000c9000000000000000000003ed0510059000000f3ff0000000000000000000000008a0800ecff000000004000f900000000000000000100000000000000"], 0xb8}}, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 05:20:20 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000000)={0x2, 0x10000, 0xfffffffff4b9fe32, 0xffffff0000000000, 0xab44, 0x6a000000}) 05:20:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r3, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 05:20:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000070000007400000000000000950000000000000011f67b869dfcb53b6a268971e3a384665701faf0edeaa33462aad32a59078e2b6f8a431f345320ac23415d697cc2dc02afa814072c6f0260bfd72454a8f27c4843b30cdcc32ee2e22d2820b16a368ecbe8b6347759709ee3b752f26eb4c289eadb117154a1484c1d637b472e204e4ebea0b4844a9cf54fed54ad2af605a15c49a9f99192cebbdbb0a8bca025f213533a2dae51fe437e0648846b2566833ac4bd5ba638b2bbeda6c72cdaf855dc5a4177e0bed36d92dde178130df1df5f6bc98d7b9bcacb07c4ea3d519d262464d6e4f64e0cfc0d27d49f794b008e330746e9ec79168a68"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 05:20:20 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2274.806594] audit_printk_skb: 66 callbacks suppressed [ 2274.806605] audit: type=1400 audit(1574832020.359:4833): avc: denied { write } for pid=1658 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:20 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000001c0)='*'}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x800000000}) fcntl$setflags(r2, 0x2, 0x1) [ 2275.335752] audit: type=1400 audit(1574832020.889:4834): avc: denied { create } for pid=1710 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x1ffffffffffffcf8, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x45}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) set_tid_address(&(0x7f0000000100)) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) io_submit(r1, 0x0, &(0x7f00000018c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004040)=[{{&(0x7f0000000180)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000200)=""/3, 0x3}, {&(0x7f0000000240)=""/20, 0x14}, {&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000001300)=""/78, 0x4e}, {&(0x7f0000001380)=""/202, 0xca}, {&(0x7f0000001480)=""/10, 0xa}, {&(0x7f00000014c0)=""/149, 0x95}, {&(0x7f0000001580)=""/103, 0x67}, {&(0x7f0000001600)=""/199, 0xc7}], 0xa}, 0x10001}, {{0x0, 0x0, &(0x7f0000001a80), 0x5}, 0x1ff}, {{&(0x7f0000001b00)=@nl=@proc, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001b80)=""/220, 0xdc}, {&(0x7f0000001c80)=""/21, 0x15}, {&(0x7f0000001cc0)=""/138, 0x8a}, {&(0x7f0000001d80)=""/129, 0x8b}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/111, 0x6f}], 0x6, &(0x7f0000002000)=""/141, 0x8d}, 0x2}, {{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f00000020c0)=""/138, 0x8a}, {&(0x7f0000001f80)=""/40, 0x28}, {&(0x7f0000002180)=""/13, 0xf0}, {&(0x7f00000021c0)=""/176, 0xb0}, {&(0x7f0000002280)=""/122, 0x7a}, {&(0x7f0000002300)=""/170, 0xaa}, {&(0x7f00000023c0)=""/121, 0x79}, {&(0x7f0000002440)=""/129, 0x81}], 0x8, &(0x7f0000002580)=""/173, 0xad}, 0x4}, {{&(0x7f0000002640)=@caif=@util, 0x80, &(0x7f0000002700)=[{&(0x7f00000026c0)=""/62, 0x3e}], 0x1}, 0xefd1}, {{&(0x7f0000002740)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000029c0)=[{&(0x7f00000027c0)=""/5, 0x5}, {&(0x7f0000002800)=""/126, 0x7e}, {&(0x7f0000002880)=""/228, 0xe4}, {&(0x7f0000002980)=""/44, 0x109}], 0x4, &(0x7f0000002a00)=""/85, 0x55}, 0x831}, {{0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000002a80)=""/75, 0x4b}, {&(0x7f0000002b00)=""/212, 0xd4}, {&(0x7f0000002c00)=""/35, 0x23}, {&(0x7f0000002c40)=""/27, 0x1b}], 0x4}, 0x10001}, {{&(0x7f0000002cc0)=@can, 0x80, &(0x7f0000003f80), 0x6, &(0x7f0000004000)=""/37, 0x25}, 0xffffffff}], 0x8, 0x12000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000004240)={'vcan0\x00', r3}) [ 2275.457523] audit: type=1400 audit(1574832021.009:4835): avc: denied { prog_load } for pid=1713 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:20:21 executing program 4: openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000340)={{0x2, 0x0, @empty}, {0x1, @random="06e5b2716c5f"}, 0x0, {0x2, 0x0, @local}, 'veth1\x00'}) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) sysinfo(0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_']) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f00000001c0)={0x8, 0x101, 0x20, 0x0, 0xeb, "0877cb85b908f64d91659d022395241793ba0f", 0x0, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x90240, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) write$P9_RREMOVE(r6, &(0x7f0000000280)={0x15}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0x0, 0x0, 0x800000000}) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r9], 0x2}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000240)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, 0x3ff, 0x3ff, 0x9de6, 0x400, 0x1f, 0x280000, r9}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4}, {}, {}, 0xfffffffe}, {{@in=@multicast1}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x1}, 0x0, 0x0, 0x0, 0x5}}, 0xe8) futex(&(0x7f0000000100)=0x2, 0x3, 0x0, &(0x7f0000000300), &(0x7f0000000340), 0x2) connect$inet6(r0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000240), 0x5c3, 0x0) openat(0xffffffffffffffff, 0x0, 0x100000, 0xd0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[]}}, 0x0) pidfd_open(0xffffffffffffffff, 0x0) [ 2275.522239] audit: type=1400 audit(1574832021.069:4836): avc: denied { prog_run } for pid=1713 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:20:21 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x7, 0x7b, 0x8000}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) pipe(&(0x7f0000000240)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000513c127c63cc18521d1549e82570994315c6de466439636a2e2703b868c08b5e267620c478c909cc1de348bc2308a6745433f89b690d2160ea788599ca0a959b76d9712094aea363b3b06c0a4c93b8666d6c2461c01fd8024c6e257bc3477b14ea23b51566bcc9ef1b3a66eb1ffe93f196"], 0x78) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000004000)=[{{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="20000000000000000000000007000000e5880f00ac1414bbac1414bbe0000001"], 0x20}}], 0x1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x81, 0x0) fstatfs(r1, &(0x7f0000000180)=""/108) accept$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) [ 2275.533662] audit: type=1400 audit(1574832021.079:4837): avc: denied { prog_load } for pid=1713 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:20:21 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r21 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r21, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r23 = syz_open_procfs(0x0, 0x0) lseek(r23, 0x0, 0x1) getpeername$packet(r23, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r25 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r25, 0x0, 0x1) getsockopt$inet6_mreq(r25, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r26}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r27}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2275.554467] audit: type=1400 audit(1574832021.109:4838): avc: denied { prog_run } for pid=1713 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:20:21 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) getpgrp(0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpgrp(0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/dev_snmp6\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0xf292970b90c98047, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) ftruncate(0xffffffffffffffff, 0x2007fff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) read$FUSE(0xffffffffffffffff, &(0x7f0000000540), 0x1000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="337f43b5bb7692bfce219600032bbd7000ffdbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b0000dfef8bffa602d5a43076a01aab0b228463eb7a72d407cf4418bc6bb208589287ae6b8dc5a3991428fe68342bc343842556fbf46269c84bc0aae9c880cf38f7e3a5eb2e238012fa0639cc70be774e6421511082856dd2b8467f563f68968c5c49fc399889f5db26f8cc9a6b7cf60f4194db29eb392fb8fe15c8ca364359b031bb949e5e76"], 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x10001) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r4 = eventfd2(0x0, 0x0) dup(r4) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000000100)={0x2, 0x16, "c92ae427853c5563c2ef5ebf761da29950bbc1fe3941"}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) [ 2275.620985] audit: type=1400 audit(1574832021.169:4839): avc: denied { create } for pid=1712 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:22 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x21) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000040)=0x4, 0x4) r4 = dup2(r0, r1) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000280)={0x30}, 0x30) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) setsockopt$IP_VS_SO_SET_FLUSH(r5, 0x0, 0x485, 0x0, 0x0) [ 2275.646783] audit: type=1400 audit(1574832021.199:4840): avc: denied { write } for pid=1712 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000300)={'broute\x00', 0x0, 0x3, 0x6c, [], 0x3, &(0x7f0000000240)=[{}, {}, {}], &(0x7f0000000280)=""/108}, &(0x7f0000000380)=0x78) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@ipv4={[], [], @loopback}}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x60, "e5ded35713882b9ed9bc5c5a1c66b92f789b133cc773ecd14dfa9409c75a3dcd1a150600"}}]}, 0x160}}, 0x0) [ 2276.093041] audit: type=1400 audit(1574832021.639:4841): avc: denied { read } for pid=1712 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2276.136023] audit: type=1400 audit(1574832021.689:4842): avc: denied { create } for pid=1710 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x5) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 05:20:23 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r21 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r21, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r23 = syz_open_procfs(0x0, 0x0) lseek(r23, 0x0, 0x1) getpeername$packet(r23, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r25 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r25, 0x0, 0x1) getsockopt$inet6_mreq(r25, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r26}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r27}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:23 executing program 4: 05:20:23 executing program 3: 05:20:23 executing program 1: 05:20:23 executing program 2: 05:20:24 executing program 4: 05:20:24 executing program 3: 05:20:24 executing program 1: 05:20:24 executing program 2: 05:20:24 executing program 5: 05:20:24 executing program 4: 05:20:24 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r21 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r21, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r23 = syz_open_procfs(0x0, 0x0) lseek(r23, 0x0, 0x1) getpeername$packet(r23, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r25 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r25, 0x0, 0x1) getsockopt$inet6_mreq(r25, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r26}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r27}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:24 executing program 3: 05:20:24 executing program 2: 05:20:24 executing program 1: 05:20:25 executing program 5: 05:20:25 executing program 4: 05:20:25 executing program 1: 05:20:25 executing program 2: 05:20:25 executing program 3: [ 2279.887574] audit_printk_skb: 39 callbacks suppressed [ 2279.887589] audit: type=1400 audit(1574832025.439:4856): avc: denied { create } for pid=1812 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:25 executing program 5: 05:20:25 executing program 4: [ 2280.251320] audit: type=1400 audit(1574832025.799:4857): avc: denied { write } for pid=1812 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:25 executing program 2: 05:20:26 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:26 executing program 1: 05:20:26 executing program 3: 05:20:26 executing program 4: 05:20:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 05:20:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() 05:20:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, 0x1, 0x1, 0xfffffffffffffffd, 0x0, 0x0, {}, [@typed={0x8, 0x15, @u32}, @nested={0x8, 0x8}]}, 0x24}}, 0x0) 05:20:26 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d316e20212e2023127d037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c208af260611e08c4fa30c8ab69b1088ae75324dc55424551f30149a7e78dee2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e62fcbbe42c88d754b724ab83787f070c"], 0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x2c) prctl$PR_SET_PTRACER(0x59616d61, r0) pipe(0x0) flock(0xffffffffffffffff, 0x8e19d3b35dceb3d) syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_cache\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000002c0)={{0x1, 0x0, @identifier="d83e4bfae6e36b362899d69b2f2232c5"}}) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x95d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:20:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @empty}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}]}, 0x60}}, 0x0) 05:20:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000300)={'broute\x00', 0x0, 0x3, 0x6c, [], 0x3, &(0x7f0000000240)=[{}, {}, {}], &(0x7f0000000280)=""/108}, &(0x7f0000000380)=0x78) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@ipv4={[], [], @loopback}}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x60, "e5ded35713882b9ed9bc5c5a1c66b92f789b133cc773ecd14dfa9409c75a3dcd1a150600"}}]}, 0x160}}, 0x0) [ 2281.367672] audit: type=1400 audit(1574832026.919:4858): avc: denied { create } for pid=1838 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2281.588177] audit: type=1400 audit(1574832027.139:4859): avc: denied { create } for pid=1846 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 2281.594017] audit: type=1400 audit(1574832027.149:4860): avc: denied { write } for pid=1846 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 2282.015761] audit: type=1400 audit(1574832027.569:4861): avc: denied { create } for pid=1846 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 05:20:27 executing program 4: r0 = socket$packet(0x11, 0x8000000000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x4000000000001004}]}, 0x10) r2 = dup(r1) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f0000000080)) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) socket$packet(0x11, 0x2, 0x300) sendmmsg(r1, &(0x7f0000000400), 0x40000000000017a, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) getsockname$packet(r4, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000012c0)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = geteuid() quotactl(0xc65e, &(0x7f0000001300)='./file0\x00', r8, &(0x7f0000001340)="3c8ddba622ad61d0d68bdbc69d609b4afdc84ec7b0dd4e4a8667f02dfdd6adcf40437766e13575911d7f890dbf807c43982ab15a75d0b1b2cc4808f5161a6936b86d04d040d0ead8ec3c4a9ef13203a7434bee26e508daf59366a2bb395c3eaa839cd0a24b68dac5350098540c72bbd0eba182c7d7efa9d4535345856f38174801ed3fc2cf18702a90120dbd4aabc1d30b729f7732957801c50c1b32e5da09f684035f5de125f6c0a41453e1022b0c70") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001400)='/dev/vga_arbiter\x00', 0x80, 0x0) r9 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r10 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r11 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r12 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r12, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r11, 0xc028660f, &(0x7f0000000200)={0x0, r12, 0x0, 0x0, 0x800000000}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r12, 0x6, 0x1d, &(0x7f0000001680)={0x1, 0x100, 0x7, 0xfffffffd, 0x7}, 0x14) write$P9_RREMOVE(r10, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000200)={0x0, r10, 0x0, 0x0, 0x800000000}) pwritev(r10, &(0x7f0000001600)=[{&(0x7f0000001440)="ff9b4cee48b694798971dfac45becddd0945cba94b30150060276b034334f9245bdc5c838e3412ca8c7b67fe400d0654b5ae05", 0x33}, {&(0x7f0000001480)="66a5835b2b7633bea1237b103d0d980da21da7b92582e2ff8ecec232710b3ef9164fca9651218cfc005c31fbd7883664f41d16324b62dbeae0c3fac7e82c17a944a22dc07ce81ec94d9030d382398d7e0fccafcdee2af7c220379dd8086befb434f15f0ffd99a01abfcdda2b6d1600d5dbe0e8b2", 0x74}, {&(0x7f0000001500)="d12e5299bcc13e03645596c1720f3130498e", 0x12}, {&(0x7f0000001540)="9582fe46986b2a5c0ae0720960c98d492948da088a32de94a47b2681f41a3232f3c25eae5c16bd2479f06483d1dc12415fc07437214df2fa51214a4695c09a1c7c2036444c6a4d6fbdd172e1cd3dcd52f29561715b9046d423a58af844fb4722882a44b518", 0x65}, {&(0x7f00000015c0)="7367b82f16862ea84f85850c199c83b84bbedd64b9476a68c8a64a8e22d11853d52b6b4afc234b96ee3bd1315fd4b048", 0x30}], 0x5, 0x1000) sendmsg$inet6(r2, &(0x7f0000001240)={&(0x7f0000000100)={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000180)="31e7a02c34ebae4da8e15ae46d1005f00e6dd05f9bb54d6b78be", 0x1a}, {&(0x7f0000000240)="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", 0x1000}], 0x2}, 0x22000890) [ 2282.017526] audit: type=1400 audit(1574832027.569:4862): avc: denied { write } for pid=1846 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 05:20:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, 0x1, 0x1, 0xfffffffffffffffd, 0x0, 0x0, {}, [@typed={0x8, 0x15, @u32}, @nested={0x8, 0x8}]}, 0x24}}, 0x0) 05:20:28 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fff) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000005c0)={'#! ', './file0'}, 0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) execve(&(0x7f0000000000)='./file1\x00', &(0x7f0000000400)=[&(0x7f00000000c0)='vmnet0\x00', &(0x7f0000000100)='/dev/null\x00', &(0x7f00000001c0)='-+#@\x00', 0x0, &(0x7f0000000240)='system@#:\\\x00', &(0x7f0000000300)='GPLuser\x00'], &(0x7f0000000540)=[0x0, &(0x7f0000000480)='\x00', 0x0, &(0x7f0000000500)='/dev/null\x00']) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[]}}, 0x0) fallocate(r3, 0x0, 0x4, 0x0) accept(r2, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2={0x2000000, [{}, {0x1}]}, 0x14, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200000, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20008080}, 0x10) ioctl$KDDISABIO(r4, 0x4b37) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r6, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffa}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2e5f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10001}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x400c005}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x2c, r6, 0xe87fa6af178fbda3, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5}, 0x80) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) socket(0x0, 0x0, 0x0) 05:20:28 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:28 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x8000) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000100)) r1 = memfd_create(&(0x7f0000000180)='&.\\keyring\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000000)={0x30}, 0x30) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo\x00') write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC], 0x14) fchdir(r2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1/file1\x00') r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x10400, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r5], 0x2}}, 0x0) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000280)={r5, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$EVIOCGABS0(r6, 0x80184540, &(0x7f00000001c0)=""/151) [ 2282.728418] audit: type=1400 audit(1574832028.279:4863): avc: denied { map_create } for pid=1872 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2282.999896] audit: type=1400 audit(1574832028.549:4864): avc: denied { create } for pid=1872 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001480), 0x1}, 0x0, 0x0, 0xfff, 0x3, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = socket$inet(0x2, 0x4800000000000002, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000002740)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1c}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000016c0)={'security\x00'}, &(0x7f0000001340)=0x54) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000001600)={0x14, 0x69, 0x1, {0x0, 0x3}}, 0x14) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) fallocate(r2, 0x0, 0x0, 0x2000002) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000001c0)={0x0, 0xff8, 0xa9}, &(0x7f0000001380)=ANY=[@ANYBLOB="656e633d706b6373310e6f22811b1da299613232340000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000015dd241f82ed4c7403faa5dacd48fa1b121ef27657fda909173"], &(0x7f0000000280)="714bb674bbe86b0c5174b8bc7ae3977e4a97e6aa4acc3f352a77aa8241b700dfe89c7241e4b7fc9208511db1fdd0070251a578b06c5eb7f20357aa6a63c46780bbfae6786f464c1a0528ded4aa82510ae171992279cce5791c33f7e7faf14c470a2b98295e304a98f15c11a2c2e8982e65ceaa688065410f77a80c27bd904e6e1c9d3f8545ecae57e68964ac2cce7fa20905028985894317971cb3445bd788d2d0ef1c7c572fcde697c6bc43dc2068a14cb9d851fcc1f5d7f51701c350a0ee4a13ad1a7c9c024e0de33033fc3e088223499ba3285fa6fb8b1cfec9657df7f7ab71be1471bdbded8fdff0183bb6d5571a57b059d008db08187dd210ba59e6b3e232d88668f73a50aa51428c05fdb92b33249899478655632c97635e8489995b37a307d6f9af159262be51e5e0f4df843e6bc9c8fd811d0737ecad3ac887b4be89628a066687a9157ace424e15d7d08c2ac390a79d69dbfa700a9a0735b2f7c1db0f452f026809409828bf3d61dd8db0184e7bcdbd406ae6a71e293c2c6f7d9e3daaa970e2c40c3c8c05941dd6b0d3fec3604a2e9ce7504dee0bb77839b19a7168a4d3caacea54603ee31cad3f95cec5e69a66d8bdf4f148c34c31f59a58b6de8f9c3e91c5e13647ea8e91af9a064f1f200a246891a34b232e1ad8b49191dc7714280f451eb96d157b7db720f235ff564fcc345467b9faccf1235204a24216f542eec3d0f53ae9b61e086c69bf5e000714544df5b7a670db099c0d7d3d2be5b1bd717d1bf2a6da12cbad44285b3df7501cf0f3b3038d96c63bf960ad9d9780017a23f2f73e51bed654afc28438cd3193992d14714805742c594d35f9f66cda52fd7679046386d5e74be5c25781194a750b73f5ef7acfa73f6b10d2417f19de6d98b4c1bcb2753dfdeef93cda39fd7680efe22359dc417bfe40e3b0ff819a1754b9be46c29ee2346b5316ea8c22bb02a552da3df54378cfce7c72db04a831e115d012339037ee3f8a3a205ed4b782f1e4435d47a7122b2245bf939ab96d2b55bd3cbe4aa9ae7e51a30ab77f85e05f107f801a2b99cba8fc85ac9831fc7ccabed2263ee8b0ac9786e063b8e096e0c3aab841fbc714ccb730c1ab360a2fb9604d4a1bc16fca91baf57ebf39d009bc46ae08fb5914a57b98a1662ec977a9a55335a3c1db056470c17a25a52c129b6473ef9a592b7cc2ff1959d65426c07ddd1e8114c671b37c6982551f7d9cd93bf6af980e769510c08ab9e9017fae4346e01a7481191349ef9f906109fdbcf6b3365e9e1cd8627dbe3dcf7c74ea9c340461eebb00e37ae88ae18556f5cd8332c5d6512742174965e42c7adda575ee1d203f197ddeb5970a405e4db968f73cb03de235e1fa644be0f1d1a2d4e7a8635c8b4335212e8fedce2a6b1e67af4b54b171694129191e86ece691fecc3fafc230b8367bd1792353e4d7831f083b68c94671914a90a56d8d17a6a59ddf4a2d95ad7aee97a23a54808d8df502ff1b4f3de5a436097f6d55402a006ddddd239897ee619b98bdc2310a9e335ee9ae1de4e5ea6adfa5a9846ff52f6d1e6a8d6c49f731b5de7b6831891cfb72fde9d078dfc08f80dbde26956813676b23da5d5ebb8b191767db61567ff3b1026665cbb4afc4d79f84d86b91720cc64d7c35569d035d6a934bb660193fca5abb0ffca6d124ac206cd29382542df7ec318f56b1af43027d2832b1a325b8904ec96a0161288a37459f39898f8851ab868410068c2478ca7e2f57c0a27aae250792660fa0c3e1e43e9688b9b61111b247aa6be61ca892fb53320b8095e3d765498bc9c5691f55994e5374392123536149284f53ee85ae44ceefa2736061b7a01e4f94e5271a6b8b6965fde07be6989c279fb81748bfafe9f653cf8bc7bb2c9fe9d87fbe80e8db181dcfc1ab173edd5ca469db5b6e5bb615e166359e77cfc357a6db04a44bf1242a8d12798933a92d5030c82a2eaa7baee9ef49e028294156d7ddf92518581d988b95d65d15e45caf93992c9b08ccf97e266e7df2b97b2c6c7871360ef75bfbca16f9ce063a51b944bc8d59d569d3fbf8e529fe8b53a748c6e07455b3e5752f4b1d3e73d8cabf1abbc851d9825303e1d7cd7e26baae0ba89b9a9a2614720f89e06e7db48df5dd7bdc2be34562e3848a5f15e9a08544b9998bfa3c2830c2dce92cc5c1298433c2ad2d3c497605a66adf0d73b98d6df117d6bb5da1a77609bbe5c15e82b125846ec4ac9891f0f269ccd07ec817ac9a1f0e0bd367c792bd20c79313605a5f94f9a4e54219867bd74bfd30aa0bd0534a92243b91c2332889e497d724fc8673b1c543e55ddbfd4c79e4ef7886d1a57ba91bc4882abade25cb294af9b9948d255260967e8180d84ad6023bf1b486ec306e1bd815674ec6f8164925b0df68914e229b3dea229be58fa19c63a5f2fbccd7496f6cdad53f2e8a43a5e2b2bb876505ddb1e8105b2d4b972f114430ba6534a54f39203e0e6ccbb73f4d08b2a5af6c02fe253f7db561e7175b6b0f13e74b02c96bed0e1d4636e7f34109b4a9378082bb330799e791782ccc7ee27220eca9eef4db27597b3d7b05b37867cff5165312f317fc7a688142e2b2ad022d34af408dd971c7fe1de9b42af8ff922caeb5bc5e9f66503020bd1a113379d9c95a8f669366e029dc7c4a8ca44f40416a53c9f85e448c6bb6789ddbeb837b7769451bf3ec29e71126fb857b2b9231a1fe5a04ef37a35b25015c245159963d13e8f9e3b0e75db11a1cc31e6b59570857ea1609d255aedb8659b5710bb8a25484a4dbc6c1cfc7ec9a6b0042c977e934ec8d88cf7f0d45607c19992b060859b9ed21919babd1452e06f33fe7392670af882edcbc4f3b92ba3495d0d2a79966bf0b4787d9142c5fbb7a51abf62698f60fb766da2ae01a0903bda752d9d490bd5d1504ac8e617f0d0edb4f60c705cedfb1f412bd3d2a1cc6be9a4214438e5588077b48a7c29579cda122a515031c68f724bd8c0ea32cf51bce4f43db48cdfa8cdc841d8cc49e5ce4e420eabc1bfa4342f656c2f51f5090179aa3d609b89302aaf5ab2078c68386cb36a44272d63f82618c375d2ba39da411ad55d5d394176b1dfbfe717c221b9cd1c26a30d5c3ece416b704a6fc593d107b5756ff5edca4e630a206879522d925a04100c2eb77a5334286eb5bc9d84c35808d307fc9dc4015f0ce2365135a75fbb76024054353092cd38203e7da2529d124a5c58575c0bf84fd73eb79e363a980aaae9249fc1f99a0afafe5bb27f06a624ffbf9657347dbb53a92735c59d5f6b7637870987c92085ed4623fc7c034f3665cbff7ebab8d139cfdf1f624cc2372cf6cffdfd850810e4694d5102dee562f9778f2e1a05a77eb34c46234d17359a5f66009dd6c8a1230c13b95912d540d465990eb7d077b3547c7c1256876af9e0e446b3ff31e1485be477b11c4a036cbd9779dc8b00cc4b4b8f13063ba6b0c6b307716d9ac72bf87be106bb027ac263881bb0322f38beef0d51f5df0805f3562eda4f0a534d24aeb80f427710d59518d801eb20cf7795fc66229aebaef3077bcc4761c91b32c054407d24791cc7d6903911857dc62812a95ada069e76bfcca8a0c86833ec188a3e019178d555e0282b5b8575c310748bb07d83bf43454c181e8bf324fea66faa73cbec5e92620fb2bd9e33b18e0920ac3829b6117c184d0636b06389462b337d3e5b4844c861fd2e11c5f058aa094b0aaf81a75069f1d970602838e53f2448c968010e1437bc80efc5474aef91eb030465ea3ed1e519a3ebcb58c53686b3bddcf80032779b63726b3d9bbd40305810762a3da464ef6596b63cc45a718bf6dc610e01daf15eef0c80f39604c46651c87bb8c824becf0cdb470c595659f230cb0a7e9331816b3b3757e86f3043e937c3d8bdeed2aead3918520d4144c54574e6a4f9e49c4b5e6171bd41561d523716787c01db024cd450348a084a062dbc20c38451679c3576e8e6756089b88deda3e206448c749b993ddf3245cdb59985df3f3bf603b1ac1df8f1e99ce1d3fbf806a30d6e752ae930d8c3456a1d49a9c3de5d55dcdae6fe41ba95ff58c3d2bde5ae828f79369b2f738ff03358a9d0ab31cea91cf4398ca25eb5b45877165d2894c58b7d472364a74b7d722e3f20cd8276ab62dc34ebd77505d185a73af1be9136057e76be21d00186fda044926a928d4e3ded28871e96f1c5e2447c29363bd99f960c73efb14e21249c06422b42fc15523d1a79aeb4ebee17d1d22c1b71f25511d2a88e5efb0f53d7e2a62138dcb5e4431b290c34925683caf74c851fa4cb2140564131e08907a2770522386058c77aed0e3260f7f2d1cd5f5f22a812240a385ce4efa281b36d7b4d7cdc3ca43ac8b2e12ad880be53defbac7ec2e81a57b8e6590d653b9228aead4b11006db5d443ad172ac6f74ddba9940608bf538e7b92c76ffbe0f6b0b6d1856501773ea0213c169a0e28b0910aaf608553a81b8eee1f93bbb64a599a87f8dfe79acdd2d47a3b4bdf047fff492371f7195b303fbc72e25b8b9747aaf5eb0d439d52e7bc579e8b04bc6972acc20666a873842bb21a92b33c8699389caa3e6ef0e39f62a4a4521b7afdd86f6474edd585dda57bcb8966329df055418053dd96c0f7bbbd9d74e0a87918cfbf909e81629ab74a4de3bce62ce64c53914339e90735f951bd79496a1647281cb74f33cb8a5691738615ce751d2dccb589fb391ca190ca3aa63ef1687dfc6927ff5e35b334c8b674c4c4abd48eb1faa503866f91027c24c4d0c0395f1d0e5b4fa26f202e73fd0ebcde41c3c3368ab38fa6d8c250287df44a82b7ad84a94ef83370326e4cec487e4b76e7b858bf19ba8c147d4d059648ae5495fde94487a562fae2406d4c2406c8e9846ab4b87623527201de74741cb2dfdc909a4cf62cb629e8fd2475ecd95efe234240803a4c70b33ee8ebd36d35ea2863b7846beb3df50b3fa63cd636e0bdb6a7f7e9baf18ab0407955b687d98520f35fc3bafc56e8a9396331767c2b52aca27d52e89f3371ee8e87467dc27e92f998678ee04e5f636b24397c2861d0dacd283dddd6af8533a5ed2480970081ecaef297c5b168ca8a7f6ae72f28b014fac972ac56b1a0e3cd9fdf11a64e4945170cab5c960da151c8c1cd13b13828b624cd636149e074f4706d549c8192e827c0eb0220f53e9a8b3e2398f5f09ecba42d87dd26e2a4dba7bcf633d7e601e5cbc829c55a882b22811b9044830cc2c11c0142b7614ca045922ae0a2d83674790be97f27d9573a4f08558d5e19795fba1e1822bb8f201f05efcd9ca20aefaddb57724e507551e271bc40e67edbff89f682ddbb4dc08f36627b7ef9bb558930c4cf06d858847acc53f64d59c4b078aeda09d09e7c239f803deea27440710e2751797eefff8a39ba871a483e48012418843917067db4199973018bf9f46cc62656c0d1be6c8ae28228caf0318e5c890584d617ca547e634f279b588ad4ac77730656d5e2753049db92596cd66f9ea244dfabefce56f93052e3ce4815256e66eb112ffc1e2f10ea935a8b4b988a1bebc55e628e526e8846c3b3b7b90ad912e129bb7d34e7b27355e40d59a4262e23262bb52a947eae8a2f33ffa133063548197c53d3983607983175ff62908630453756a2ed08f82bf61b1b0d7593191cf4e24bbfd29c0c6d4e36dd93af2eb5c0224d5deac7afe099d75d1a3b20d60b6283494c9f8cdb7c0fd3ce688afa20e1e49d95f68ce8d5cfb1ecef3f84ca199fdbc68efd22f6cca07b1ccdec765", &(0x7f0000001280)="331dab9f4d38afb7d30ed0775ba133f6a25387584b1069729aaa9ac5d478e98565464ad83b37b30bae40310ef1a070b2a28396f96104491ee0612e3ae58f3886fd828d90f1437fb5da61c74b362a57825e5d98ea257297c4ea186c8cbebfd245c0cf78a189e3138cd1ab2ec474b0170fa2449af8e4e2713f1f84b913ea636b784193506d7cae98337d4716f60cc374fdb3487c085c8730029f680423288a0fb975178a67a7fdfe522b") ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x4}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001640)=""/12, &(0x7f0000001680)=0xc) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') r5 = socket$packet(0x11, 0x2, 0x300) alarm(0x200) writev(0xffffffffffffffff, &(0x7f0000001980)=[{&(0x7f0000001740)="e6bb8c7e0a8fa943ece485068744e9219cb18191e631e0d9ead54510413c5756cd164270ec321bc2fd621e8d4a043c773c7fceec360b829986d3533343b98dbe0de939560f85104947f1d2f882cc81fdd8910b57ccda", 0x56}, {&(0x7f00000017c0)="a34c761f3892b1f7b605370c4adedbf0d975ab8dd5ae8f8e9be2ebbd3ba28b31d081c00b8454637d0eace185362c34b27763beda546a4a4aac958d4cd3aea6c42904d2de939b4bb307639ae6a02e26519386ed7781bdf6ea032ee62a92f9e14e2a7fa1b73659a52d68c4a3c10222", 0x6e}, {&(0x7f0000001840)="c407ba710d50ba1d3514caeea57a06b6abc2608063dce092ac21203007a7e92ea1ec8db05d84264c3a79acd966c21cacc7beeb9fb780672a608302c0837bf9f7be8b76965427cdcace21ba62db2264ef734dbac82baac84641", 0x59}, {&(0x7f0000001400)="5b32c237b0f7f380329e09c3", 0xc}, {&(0x7f00000018c0)="b63a1fcd965558cf627ddb292431eb24d1cbf4e0b5e7fda2acae479729b635e8820b8a184dda57617745d7dc3294ac41d04c2796993d34d17b83344d9fef5294cb2a76b42380f9d024fbacdd585a431dd9a19cfc24ce63553a15ac19256639978e758c997ee928b02127f39103245e74dd863b8c6b4e5ded0623c0e967e6182a6a", 0x81}], 0x5) sendmsg$sock(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80, 0x0, 0x0, &(0x7f0000000280)=[@mark={{0x10}}], 0x10}, 0x0) fcntl$setstatus(r5, 0x4, 0x24000) readlinkat(r3, &(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/114, 0x72) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000200)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x200000, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000001500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x102000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x3c, r4, 0x900, 0x70bd25, 0x25dfdbfd, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10000}, 0x55d5dee153a446a7) [ 2283.114986] audit: type=1400 audit(1574832028.659:4865): avc: denied { create } for pid=1872 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x9, @mcast2, 0x3}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0xfed1}], 0x1) r3 = dup2(r2, 0xffffffffffffffff) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000000)={0x2, 0x0, 0x100, 0x73, 0x7fff, 0x2}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) readv(r2, &(0x7f0000001600)=[{&(0x7f0000000040)=""/175, 0xaf}], 0x1) 05:20:29 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0}, &(0x7f00000004c0)=0xc) ptrace$poke(0x5, r0, &(0x7f0000000500), 0x0) setxattr(0x0, &(0x7f0000000200)=@known='trusted.syz\x00', &(0x7f0000000240)='\\nodev,.#vmnet1\x00', 0x10, 0x1) ptrace$cont(0x9, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r5, 0x0) accept4(r5, 0x0, &(0x7f0000000140), 0x800) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/ip_mr_cache\x00') r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x11, 0x800000003, 0x0) r9 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r9, &(0x7f0000000000), 0x10000}]) lseek(r9, 0x6, 0x4) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r10, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x38, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}, {0x8, 0xb, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x8078}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000003c0), 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000000)='\\proc\x00', 0xffffffffffffffff}, 0x30) ptrace$setopts(0x4200, r11, 0x2, 0x6c) 05:20:30 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sync() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r3 = creat(&(0x7f0000000100)='./file0\x00', 0x2) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000240)={0x7}, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f00000000c0), 0x4) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000300)=""/244) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000400)=@v1={0x2, "8fa6f05e5bd4f7be1f8eaf889e"}, 0xe, 0x1) 05:20:30 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:30 executing program 4: sched_setaffinity(0x0, 0x2de, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x800000000}) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000300)={0x400, 0x7fffffff, 0x9, 0x3ff, 0x8, 0xffff8000}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x276, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1}, 0x100) pipe(&(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10a000}, 0xfdd8, 0x0, 0x1, 0x0, 0x0, 0x10448}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x15440, 0x0) fcntl$setflags(r3, 0x2, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f00000002c0)={'\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}}) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:20:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000000c0)={0x0, 0x800, 0x0, 0x4, 0x1, [{0x0, 0xeb3, 0x400, 0x0, 0x0, 0x2}]}) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) fchmod(r4, 0x100) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r6, &(0x7f0000001400)="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", 0x600) sendfile(r6, r7, 0x0, 0x10000) [ 2285.306463] audit_printk_skb: 51 callbacks suppressed [ 2285.306478] audit: type=1400 audit(1574832030.859:4883): avc: denied { create } for pid=1941 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x5c, r3, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x29}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1f}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000020}, 0x1) r4 = dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) sendmmsg(r2, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100), 0x1be}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000b40)="70799d7f93aee25740609238367b30d5bd2da4a8a782f1e2bfe6e09ea5587d2488139bce0b6720aa3beec624a66fba665935593f143410e814194574d6c5caa5a0a643a77a6837f10a97664379ac508c2c604e84b914cca11d7c13c7516775c47b89811abd1b86bdc06b4c2df598cc7f7707a1c0400e52e98972dcc961b5a697d45539c7b8f008ed83ff9a7e106143", 0x8f}, {&(0x7f0000000f40)="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", 0x1d5}], 0x2}}], 0x2, 0x0) r5 = accept$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000100)=0x1c) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000200)=0xc) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) sendto$inet(r2, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) sync_file_range(r0, 0x8, 0x6, 0x7) [ 2285.825263] audit: type=1400 audit(1574832031.359:4884): avc: denied { write } for pid=1941 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xfffffe97, r3, 0x20, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x44803) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000100)=0x9) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000400)={0x30, 0x5, 0x0, {0x0, 0x1, 0x100000001, 0x4}}, 0x30) r5 = inotify_init1(0x80000) r6 = fcntl$dupfd(r5, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="74696c655f6f66666666d86666666234642c31a56109dd10e7ae974b00f3d960d1646f74732c756723567759b57bd4f67375652c6ef09d25d454aef9d4e7816156f7102d4f8a7aafbc75f2953c5c2b352b44ae5f2607"]) 05:20:31 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:31 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000700)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="00abe6d29e6101cb8b41eea5cf2e67fea541e9b7b65fe42e517d2f4cf7f77a16fc3e961a0847916c7c2ddb77cd3160567341263cf19b3b2c6177e7065dda850c756c06aede12e9da8118bb5464ad07fa6146f6903ee57345cbd7551f547bdbe947b4f9a0b28cf29a28eda534fc6e2c9bf2c36c87da9ad79e6e70900000000000005c3d185ea94575ed4aa4bd3b978ed2eb1e852f163fffd58aead40e5270f159bc8ddb168b4d37a189770a6f7c00"/187, 0xbb, 0x4000801, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000440)=""/98, 0xffffffffffffff55, 0xc0000182, 0x0, 0xfbf724d7a6e788ef) read(r0, &(0x7f00000001c0)=""/244, 0xffffff52) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x802) fcntl$setpipe(r3, 0x407, 0xed) 05:20:31 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) io_submit(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000240)=0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r6, 0x0) r7 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, &(0x7f00000003c0)=0x1c, 0x80800) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r7, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='.\x00']) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r10}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r11 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r11, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="c5bb6c356c3f39aa1718af2addc6411b900a3b2b0d77bb02d6a2370b33b9bbca7a3543ff7804a28d13b1e9a8c8c0d4290af44d983f1677538834ab2a42df6ad9d0a517aa5078a781eea5491e685cd6861978145e6d4edf37baaabcffc2967f6bf49ad0fa8c3378068042db38b3b374eb4fd34bf7dacc23e0d669c44811cafda6e35fbb6bbb1343786f9d580d8e9125ec2b1bbb0e9cc9f3100c599673d5cb4e925586eae01bd94ab41cdd041d62059e77d52cc19d86df5f973be84ff0b68fec689029e60e7e9f762a6f80833a7bf4c24e4ba2e9cd53131f4ada0d4a0b8e89dd"]) r12 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r12, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c004042aa5f0d21998cf3e86ed3239ee81fe269bae36a96b612d1bb60ef6108d98d24d89706448cf87a18167df0d59d53e27bcf5a1e92a6b8baa883d58d2d4ffacb722668453d6716"]) r13 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r13}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000980)=ANY=[@ANYRES16=r8, @ANYPTR=&(0x7f0000000180)=ANY=[], @ANYRES64=r8, @ANYBLOB="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", @ANYRES32=r12]], 0xfffffffffffffd92) r14 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r14, &(0x7f00000004c0)=ANY=[@ANYBLOB="eca1de103ad24dfb000000000000fb00008096e2a942cdb6c2ab97144d39b381fde9ab5a858cf069f9b50b6a40f3cf4253173525fe8820cd44e11bcf0503759fa49f7c4a92d084a7375898a03210c67c4d1763cc0ae0d418901436a99a0a2e4a46685f23c20600000000000000bf760a62e76e540e5f0cb3e25277d3"], 0x2) lseek(r14, 0x0, 0x3) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0xba, @remote, 0x120}, 0x1c) 05:20:31 executing program 1: ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x37f) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) creat(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000004c0)='4', 0x1, 0x4080, 0x0, 0x25b) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x1ff) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 2286.597023] audit: type=1400 audit(1574832032.149:4885): avc: denied { create } for pid=1982 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) removexattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)=@known='trusted.overlay.origin\x00') ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001bc0), 0x40000000000016b, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000380)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x4000, 0x0) iopl(0x8) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000180)={{}, {r2, r3+30000000}}, &(0x7f00000001c0)) getdents(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r4, &(0x7f0000000080), 0xff97) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) [ 2286.889588] audit: type=1400 audit(1574832032.439:4886): avc: denied { create } for pid=1986 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2286.892702] audit: type=1400 audit(1574832032.439:4887): avc: denied { write } for pid=1986 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:32 executing program 4: r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0xc) splice(r1, 0x0, r3, 0x0, 0x422000a7b, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x875f) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) socket$inet6_tcp(0xa, 0x1, 0x0) 05:20:33 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2286.943398] audit: type=1400 audit(1574832032.479:4888): avc: denied { create } for pid=1991 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:33 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) accept(r2, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000005480)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) [ 2286.946666] audit: type=1400 audit(1574832032.479:4889): avc: denied { write } for pid=1991 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2287.085407] FAT-fs (loop2): Unrecognized mount option "tile_offffØfffb4d" or missing value [ 2287.394560] audit: type=1400 audit(1574832032.949:4890): avc: denied { read } for pid=1991 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:33 executing program 5: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000200000000000000e00000016", 0x31, 0x1400}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) r2 = accept4$unix(r1, 0x0, &(0x7f0000000000), 0x40000) accept4$unix(r2, 0x0, &(0x7f0000000040), 0x0) [ 2287.404035] audit: type=1400 audit(1574832032.959:4891): avc: denied { create } for pid=1991 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2287.405980] audit: type=1400 audit(1574832032.959:4892): avc: denied { write } for pid=1991 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2287.478303] FAT-fs (loop2): Unrecognized mount option "tile_offffØfffb4d" or missing value 05:20:34 executing program 3: listen(0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000700)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)='tracefs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000002fc0)=""/248) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x5b) recvmmsg(r2, &(0x7f0000004c00)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/132, 0x84}, {&(0x7f00000001c0)=""/34, 0x22}, {&(0x7f0000000200)=""/167, 0xa7}, {&(0x7f0000000340)=""/10, 0xa}, {&(0x7f0000000380)=""/148, 0x94}, {&(0x7f0000000440)=""/25, 0x19}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x7, &(0x7f0000000580)=""/35, 0x23}}, {{&(0x7f00000005c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000002940)=[{&(0x7f0000000640)=""/113, 0x71}, {&(0x7f0000002800)=""/94, 0x5e}, {&(0x7f0000002880)=""/76, 0x4c}, {&(0x7f00000006c0)=""/1, 0x1}, {&(0x7f0000002900)=""/43, 0x2b}], 0x5, &(0x7f000001d080)=""/102400, 0x19000}, 0x7}, {{&(0x7f0000002a00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002a80)=""/195, 0xc3}], 0x1, &(0x7f0000002bc0)=""/45, 0x2d}, 0xd831}, {{&(0x7f0000002c00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000002c80)=""/102, 0x66}, {&(0x7f0000002d00)=""/58, 0x3a}, {&(0x7f0000002d40)=""/56, 0x38}, {&(0x7f0000002d80)=""/213, 0xd5}], 0x4, &(0x7f0000002ec0)=""/211, 0xd3}}, {{&(0x7f00000033c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000004500)=[{&(0x7f0000003440)=""/46, 0x2e}, {&(0x7f0000003480)=""/65, 0x41}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x3}, 0x3f}, {{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000004540)=""/79, 0x4f}, {&(0x7f00000045c0)=""/105, 0x69}, {0x0}, {&(0x7f00000046c0)=""/255, 0xff}], 0x4, &(0x7f0000004800)=""/18, 0x12}, 0x5}, {{&(0x7f0000004840)=@x25, 0x80, &(0x7f0000004b80)=[{&(0x7f00000048c0)=""/86, 0x56}, {&(0x7f0000004940)=""/102, 0x66}, {&(0x7f00000049c0)=""/68, 0x44}, {&(0x7f0000004a40)=""/209, 0xd1}, {&(0x7f0000004b40)=""/16, 0x10}], 0x5}, 0x7}], 0x7, 0x20, 0x0) unlink(&(0x7f0000000000)='./file0\x00') getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000800)=""/4096, &(0x7f0000000040)=0x1000) 05:20:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4826}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) 05:20:34 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x40000008}) ftruncate(r0, 0x1c08) r2 = open(&(0x7f0000000100)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = eventfd(0x0) fcntl$dupfd(r3, 0x0, r4) write$FUSE_LK(r2, &(0x7f0000000040)={0x28}, 0x28) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000140)={0x30}, 0x80b3) 05:20:34 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2288.913201] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2288.986491] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 2289.071124] F2FS-fs (loop5): Wrong segment_count / block_count (22 > 8192) 05:20:34 executing program 4: getrusage(0xffffffffffffffff, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 2289.152157] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 05:20:34 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) poll(&(0x7f0000000140)=[{r2, 0x6587}, {0xffffffffffffffff, 0x80}, {}], 0x3, 0xe123) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) r4 = socket(0x2, 0x0, 0x76) getpeername$unix(r4, &(0x7f0000000180)=@abs, &(0x7f00000000c0)=0x6e) sendfile(r0, r3, 0x0, 0x800000000024) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) [ 2289.330149] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2289.378411] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 2289.475067] F2FS-fs (loop5): Wrong segment_count / block_count (22 > 8192) [ 2289.560290] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 05:20:35 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x640, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000140)={{0x5, 0x0, 0x6, 0x4}, 'syz1\x00', 0x20}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 05:20:35 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x32d4, 0x7fffffff, 0x8, 0x6, 0x7ee5}, 0x14) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="130000003200010100000000000000000000025588dd8b001c00000000000c00ecbddd3a9df65900010067616374000000000400020004000600ebbfba5878201955eeea4d56d2b39764eb2e2003d8635a5d3cd26ac2cdcb98302e110290a6cb7ae4bfe2f16495f487a52626e141d58ba3b10466bee6e0af877692e2a0"], 0x34}}, 0x0) 05:20:35 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4001100a}, 0xc, 0x0}, 0x4000) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x40480cd) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000740)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ce3cf87be6163c0300"/90], 0x4}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000740)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x44, 0x5, [{{@in=@remote, 0x0, 0x2b}, 0x0, @in6=@loopback, 0x0, 0x2}]}]}, 0xfc}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0xffffffffffffffba, &(0x7f00000bfff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000f2ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044000500ac1414bb000000000000000000000000000000002b000000000000000000000000000000000000000000000100000000020000000000000000000000000000000000000000009362d1a1d700fc3aefcdbbbb575edfa7a3ec660e5781dc907c43ea1fa49c9d148286edd5def11c864a54a05b60c3c795c169d797"], 0xfc}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000440)=ANY=[@ANYPTR64], 0x8) r6 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'\x02\xfb8', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x11, r6, 0xfffffffffffffffd) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000840)=0xc19d) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) sendfile(r0, r1, 0x0, 0x80000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140)=0x8800, 0x8800000) pipe2(&(0x7f0000000600), 0x2c00) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r8) getresgid(&(0x7f0000000900), &(0x7f0000000680), &(0x7f00000006c0)) io_setup(0xff, &(0x7f00000000c0)) close(0xffffffffffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, 0x0, &(0x7f00000000c0)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000007c0)) 05:20:35 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) socket(0x0, 0x2, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xb3a) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0xac0, 0x0) [ 2290.305215] ip6_tunnel: ˆ xmit: Local address not yet configured! [ 2290.311750] ip6_tunnel: ˆ xmit: Local address not yet configured! [ 2290.333660] ip6_tunnel: ˆ xmit: Local address not yet configured! 05:20:35 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2290.416389] ip6_tunnel: ‰ xmit: Local address not yet configured! [ 2290.443685] ip6_tunnel: ‰ xmit: Local address not yet configured! [ 2290.487146] ip6_tunnel: ‰ xmit: Local address not yet configured! [ 2290.683675] ip6_tunnel: ˆ xmit: Local address not yet configured! [ 2290.773660] ip6_tunnel: ‰ xmit: Local address not yet configured! [ 2290.843654] ip6_tunnel: ‰ xmit: Local address not yet configured! [ 2290.919686] audit_printk_skb: 30 callbacks suppressed [ 2290.919697] audit: type=1400 audit(1574832036.469:4903): avc: denied { create } for pid=2103 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:36 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x640, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000140)={{0x5, 0x0, 0x6, 0x4}, 'syz1\x00', 0x20}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 2290.957359] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2291.263675] ip6_tunnel: ˆ xmit: Local address not yet configured! 05:20:37 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) socket(0x0, 0x2, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xb3a) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0xac0, 0x0) [ 2291.332481] audit: type=1400 audit(1574832036.879:4904): avc: denied { create } for pid=2114 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2291.347696] audit: type=1400 audit(1574832036.899:4905): avc: denied { write } for pid=2114 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:37 executing program 3: r0 = socket$inet(0x10, 0x80001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 05:20:37 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2291.612629] audit: type=1400 audit(1574832037.159:4906): avc: denied { create } for pid=2103 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2291.618768] audit: type=1400 audit(1574832037.169:4907): avc: denied { write } for pid=2103 comm="syz-executor.2" path="socket:[146348]" dev="sockfs" ino=146348 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:37 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2291.624682] audit: type=1400 audit(1574832037.179:4908): avc: denied { write } for pid=2103 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:38 executing program 1: r0 = syz_open_procfs(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x500) dup3(r2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) ptrace$setsig(0x4203, r4, 0x101, &(0x7f0000000440)={0x10, 0x7, 0xff}) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 05:20:38 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x148610bd1dbdaa3}, 0x0, 0x0, 0x8d92}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 2291.628668] audit: type=1400 audit(1574832037.179:4909): avc: denied { write } for pid=2103 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2291.647344] audit: type=1400 audit(1574832037.199:4910): avc: denied { ioctl } for pid=2103 comm="syz-executor.2" path="socket:[146348]" dev="sockfs" ino=146348 ioctlcmd=0x7709 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:38 executing program 4: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4200, r2, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) wait4(r3, 0x0, 0x0, 0x0) [ 2291.649226] audit: type=1400 audit(1574832037.199:4911): avc: denied { write } for pid=2103 comm="syz-executor.2" path="socket:[146348]" dev="sockfs" ino=146348 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:39 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2291.675455] audit: type=1400 audit(1574832037.229:4912): avc: denied { write } for pid=2103 comm="syz-executor.2" path="socket:[146348]" dev="sockfs" ino=146348 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2291.874751] tc_dump_action: action bad kind [ 2291.877235] tc_dump_action: action bad kind 05:20:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sync() inotify_init() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) pipe(&(0x7f0000000000)) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 05:20:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0/file0/../file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x15010, 0x0) 05:20:39 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x1ac, r6, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xb8, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x800, 0x4, @empty, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1b}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9fae}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xba7, @empty, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x9, @rand_addr="c6817e542d1ed76bf322b521cce047cc", 0x6}}}}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x4004820}, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x72439a6b) [ 2294.157917] proc: unrecognized mount option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" or missing value [ 2294.281018] proc: unrecognized mount option "¨6Š›ø]Åcše!­?šteéòcÎZ%š" or missing value 05:20:39 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000001580)=""/4101, 0x1005}], 0x1}}], 0x1, 0x20000180, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x2d) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d008000028000d68004afa71a5a9000000000000", @ANYRES32=r6], 0x2}}, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @dev={0xac, 0x14, 0x14, 0x22}, r6}, 0xc) r7 = dup(0xffffffffffffffff) ioctl$LOOP_GET_STATUS64(r7, 0x4c05, &(0x7f0000000100)) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0xfffffe25) [ 2294.383654] ip6_tunnel: ‰ xmit: Local address not yet configured! [ 2294.463647] ip6_tunnel: ˆ xmit: Local address not yet configured! 05:20:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xffffffffffffffcd, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)={0x68, 0x29, 0x0, {0x0, [{{0x0, 0x2, 0x6}, 0xf2c5, 0x0, 0x7, './file0'}, {{}, 0xfff, 0x45, 0x7, './file0'}, {{}, 0x0, 0xfd, 0x7, './file0'}]}}, 0x68) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000004000000130008001b0000000000"], 0x28}}, 0x0) sysinfo(&(0x7f00000003c0)=""/50) 05:20:40 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, 0xffffffffffffffff) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x268380, 0x0) creat(0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r8, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) splice(r7, 0x0, r6, 0x0, 0xb, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:20:41 executing program 2: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f00000006c0)=""/4096) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x10, &(0x7f0000000640)={&(0x7f0000000440)=""/203, 0xcb}}, 0x10) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'nr0\x00', 0x2}, 0x18) recvfrom(r4, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 2295.441865] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26982 sclass=netlink_route_socket pig=2218 comm=syz-executor.5 [ 2295.533689] ip6_tunnel: ’ xmit: Local address not yet configured! 05:20:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x605, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x20, 0x3, 0x10000001, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @u32}]}]}, 0x20}}, 0x0) 05:20:41 executing program 3: perf_event_open(&(0x7f0000001900)={0x1, 0x1f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(r0, 0x0, 0x4) [ 2295.923670] ip6_tunnel: ’ xmit: Local address not yet configured! [ 2296.192505] audit_printk_skb: 99 callbacks suppressed 05:20:41 executing program 4: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'\x80\x00'}, 0x0, 0x0, 0xfffffffffffffffc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) keyctl$revoke(0x3, r0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0x0, 0x0, 0x800000000}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000ed000200"/72], 0x48) keyctl$invalidate(0x15, r0) [ 2296.192518] audit: type=1400 audit(1574832041.739:4946): avc: denied { create } for pid=2234 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 2296.560014] audit: type=1400 audit(1574832042.109:4947): avc: denied { read } for pid=2224 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:42 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:42 executing program 1: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/vev/nullb0\x00'], &(0x7f0000000400)='./bus\x00', &(0x7f0000000440)='ceph\x00', 0x2008000, &(0x7f0000000480)='\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000005c0)='./bus\x00', 0x30d42, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) getsockopt$bt_hci(r2, 0x0, 0x2, &(0x7f0000000300)=""/219, &(0x7f0000000080)=0xdb) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea110200000500", 0x27}], 0x1) fstat(0xffffffffffffffff, &(0x7f0000000500)) unshare(0x40000000) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/status\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r5, 0x4b41, &(0x7f0000000400)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1f) ftruncate(0xffffffffffffffff, 0x200004) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/member\x00', 0x2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8923, &(0x7f0000000200)={'ip_vti0\x00'}) mount(0x0, 0x0, &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) [ 2296.754527] audit: type=1400 audit(1574832042.299:4948): avc: denied { create } for pid=2241 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f00000055c0)=[{{&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, 0x0}}, {{&(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @broadcast}}}], 0x20}}], 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x103400, &(0x7f0000000700)=ANY=[]) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE2(r3, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = eventfd2(0x81, 0x80001) ftruncate(r4, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x20000001) eventfd2(0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000180), 0x4) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x800016, 0x10, r5, 0xca832000) pipe(&(0x7f0000000180)) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000000600)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) [ 2296.857389] audit: type=1400 audit(1574832042.409:4949): avc: denied { write } for pid=2241 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2296.945541] audit: type=1400 audit(1574832042.499:4950): avc: denied { create } for pid=2234 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 05:20:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x200000000000002, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'v\xe5th0\x00', 0x2000}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@local, 0x4, r3}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0x0, 0x0, 0x800000000}) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000100)='veth1\x00') setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000000c0)={@mcast1, r3}, 0x14) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="d214c0e12eb5e6ea076cca63e0537907"}, 0x1c) 05:20:43 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000005c0)={'#! ', './file0'}, 0xb) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x88, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) execve(&(0x7f0000000000)='./file1\x00', &(0x7f0000000400)=[&(0x7f0000000100)='/dev/null\x00', &(0x7f00000001c0)='-+#@\x00', 0x0, &(0x7f0000000240)='system@#:\\\x00', &(0x7f0000000300)='GPLuser\x00', &(0x7f00000003c0)='\xabuser:(\x00'], &(0x7f0000000540)=[0x0, &(0x7f0000000480)='\x00', 0x0, &(0x7f0000000500)='/dev/null\x00']) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[]}}, 0x0) fallocate(r3, 0x0, 0x4, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2={0x2000000, [{}, {0x1}]}, 0x14, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200000, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000140)=[0x1, 0x1]) socket(0x0, 0x0, 0x0) [ 2296.948505] audit: type=1400 audit(1574832042.499:4951): avc: denied { write } for pid=2234 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 2296.948569] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2297.286357] audit: type=1400 audit(1574832042.839:4952): avc: denied { read } for pid=2241 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2297.450806] audit: type=1400 audit(1574832042.999:4953): avc: denied { create } for pid=2241 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:43 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2297.483761] audit: type=1400 audit(1574832042.999:4954): avc: denied { write } for pid=2241 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2297.722602] audit: type=1400 audit(1574832043.269:4955): avc: denied { create } for pid=2266 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:44 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002600)=ANY=[@ANYRES32, @ANYRESOCT, @ANYRES32=0x0, @ANYRESDEC=0x0, @ANYRESDEC=r1, @ANYRES32=r2], 0x8) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x23, &(0x7f0000000980)=0x7ff, 0x4) setsockopt$sock_int(r4, 0x1, 0x29, &(0x7f00000001c0)=0xffff8001, 0x4) recvmmsg(r4, &(0x7f0000002480)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/65, 0x41}, {&(0x7f0000000200)=""/173, 0xad}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000040)=""/53, 0x35}, {&(0x7f0000000340)=""/121, 0x79}], 0x5, &(0x7f0000000440)=""/96, 0x60}, 0x3}, {{&(0x7f00000004c0)=@nl=@unspec, 0x80, &(0x7f0000000900)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/165, 0xa5}, {&(0x7f00000006c0)=""/131, 0x83}, {&(0x7f00000007c0)=""/15, 0xf}, {&(0x7f0000000800)=""/181, 0xb5}, {&(0x7f00000008c0)=""/50, 0x32}], 0x6, &(0x7f00000009c0)=""/135, 0x87}, 0xbf}, {{0x0, 0x0, &(0x7f0000000a80)}, 0xbc}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000ac0)=""/236, 0xec}, {&(0x7f0000000bc0)=""/124, 0x7c}, {&(0x7f0000000c40)=""/108, 0x6c}, {&(0x7f0000000cc0)=""/59, 0x3b}], 0x4, &(0x7f0000000d40)=""/138, 0x8a}, 0x4}, {{&(0x7f0000000e00)=@xdp, 0x80, &(0x7f0000001f80)=[{&(0x7f0000000e80)=""/7, 0x7}, {&(0x7f0000000ec0)=""/155, 0x9b}, {&(0x7f0000000f80)=""/4096, 0x1000}], 0x3, &(0x7f0000001fc0)=""/67, 0x43}, 0xc59d}, {{&(0x7f0000002040)=@caif=@dbg, 0x80, &(0x7f0000002380)=[{&(0x7f00000020c0)=""/76, 0x4c}, {&(0x7f0000002140)=""/8, 0x8}, {&(0x7f0000002180)=""/107, 0x6b}, {&(0x7f0000002200)=""/27, 0x1b}, {&(0x7f0000002240)=""/142, 0x8e}, {&(0x7f0000002300)=""/77, 0x4d}], 0x6, &(0x7f0000002400)=""/117, 0x75}, 0x7fffffff}], 0x6, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) 05:20:44 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x605, 0xffffffffffffffff) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000080)={{0x1, 0x0, @reserved="c352e8ba7434f18bf95dc5a482087f1f99364dc589f7484fa95fa459371bac29"}, 0x8, [], "6c10ab25685fbee8"}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x800, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_emit_ethernet(0x1200, &(0x7f00000001c0)={@empty, @dev={[], 0x1b}, [{[{0x9100, 0x4}], {0x8100, 0x4, 0x1, 0x1}}], {@ipv6={0x86dd, {0x7, 0x6, "e06963", 0x11c2, 0x21, 0x33, @mcast2, @loopback, {[@dstopts={0x2d, 0x2, [], [@hao={0xc9, 0x10, @ipv4={[], [], @multicast2}}]}, @dstopts={0xff}], @gre={{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x1000, 0x2, [0x8, 0x3], "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"}, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "24728af04b2443d5e9cbbaea8e2c5dd48c2d6d6f2dea8da25d07b3276141116413b50c1a6382d7e7a645f39c9591702f0f6c6d7413b3eedb753c59742d004ea499398dacd24d98add5b9"}, {0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x86dd, [0x6bdc], "23fe588f00e1f37a0aac412687754b486fc5ade034ac93be08048b22f7f8ec29e11aa64ab61d8e63663721486d36dea06d6b78d540c4f028b57f84b283cb5754fe588a18bdb8799ec147eaf47719e101e83db986ac4b5cf700c58640cceeb16038d694d76c80b367c5e10786988008999b0bf9ca50fd5f33ba343cb05ca288"}, {0x8, 0x88be, 0x2, {{0x4, 0x1, 0x8, 0x2, 0x1, 0x1, 0x4, 0x3}, 0x1, 0x2}}, {0x8, 0x22eb, 0x4, {{0x6, 0x2, 0x20, 0x1, 0x0, 0x1, 0x2, 0x5}, 0x2, 0x1, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1}}, {0x8, 0x6558, 0x1, "7510b43bf53fe145162a1e4d6ea57fd2c1c9601bd7e75e0067d2e81014a7a14ea532902e76be3ee40adcc6b59a6b1ac2e6e7b005ed9f5dcac83460e83f70f500a281ff7e9f45784542ed830760f2f1f06299a907692aed2ef94dcf1353b148cbba61ee21d6db6ff10a406f13453c997c93beeca74822b2813e07695f2f091ff92f7d85da2d960a"}}}}}}}, &(0x7f00000013c0)={0x1, 0x3, [0x9ef, 0x3d2, 0xe01, 0x59d]}) exit(0x8) fallocate(r2, 0x8, 0x5, 0xf8000000000) socket$netlink(0x10, 0x3, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001400)='/dev/ppp\x00', 0x2237c0, 0x0) ioctl$PPPIOCGFLAGS1(r4, 0x8004745a, &(0x7f0000001440)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)=0x0) r7 = syz_open_procfs(r6, &(0x7f0000001500)='attr/current\x00') r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001540)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKDISCARD(r8, 0x1277, &(0x7f0000001580)=0x200) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000001600)="5f68c40c1116f7b34736b5e996605f860a38e1dcff64ceba54f65d68626e4d8fa262f3", 0x23) open(&(0x7f0000001640)='./file0\x00', 0x4000, 0x9) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r9, 0x400c6615, &(0x7f0000001680)) r10 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000016c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r1, &(0x7f0000001700)={0x60000004}) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000001740)='/selinux/user\x00', 0x2, 0x0) syz_open_pts(r7, 0x4200) r11 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000001940)='/selinux/create\x00', 0x2, 0x0) dup2(r0, r11) 05:20:45 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7277}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x24, 0x0, &(0x7f0000000140)=[@request_death, @register_looper, @clear_death], 0x0, 0x20000000, 0x0}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)={'#! ', './file0', [{0x20, 'smackfstransmute'}, {0x20, '\\'}, {0x20, 'vboxnet0'}, {}, {0x20, 'user_id'}, {0x20, '\''}]}, 0x32) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) timer_create(0x0, &(0x7f0000000480)={0x0, 0x32, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000007c0)=0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}}, 0x0) ftruncate(0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x6, 0x3, 0x6, 0x9, 0x0, 0x1, 0x2400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0xf2d8b275e8d6173b}, 0x0, 0x0, 0x9, 0x7, 0x7, 0x0, 0x62}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0xfffffffffffffffe, 0x7, 0xfff, 0x4}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) shutdown(0xffffffffffffffff, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='\x00', &(0x7f0000000180)='bpf\x00', 0x808, &(0x7f00000003c0)={[], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r2}}, {@uid_lt={'uid<', r5}}, {@context={'t\x00', 0x3d, 'sysadm_u'}}]}) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@getaddr={0x14, 0x16, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}}, 0x2040000) 05:20:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) futex(0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x2, 0x80) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x3000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000425bd7000fbdbdf250d0000002800070008000100ff03000008000200ffffffff0c00040003000000000000000800010000000080"], 0x3c}}, 0x4000) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x7c) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'\x02\xfb8', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x11, r3, 0xfffffffffffffffd) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r4, 0x40045201, &(0x7f0000000840)=0xc19d) keyctl$get_security(0x11, r3, &(0x7f0000000180)=""/72, 0x48) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) keyctl$set_timeout(0xf, r3, 0x10001) sendfile(r0, r2, 0x0, 0x80000000) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000140)=0x8800, 0x8800000) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r7) getresgid(&(0x7f0000000900), &(0x7f0000000680), &(0x7f00000006c0)=0x0) write$P9_RGETATTR(r5, &(0x7f0000000700)={0xa0, 0x19, 0x2, {0x1000, {0x42, 0x0, 0x2}, 0x20, r7, r8, 0x80000001, 0x7, 0x81, 0x5, 0x2a3, 0x0, 0xeb6, 0x8001, 0x6, 0xfffffffffffffffc, 0x3, 0x200, 0x10000, 0x4, 0x1}}, 0xa0) io_setup(0xff, &(0x7f00000000c0)) r9 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r9) getsockopt$inet6_tcp_buf(r9, 0x6, 0x1c, 0x0, &(0x7f00000000c0)) ioctl$TIOCGWINSZ(r9, 0x5413, &(0x7f00000007c0)) 05:20:46 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x101000, 0x108) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000d00)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000e40)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1010000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000d40)={0xb4, r2, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x122600}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20088000}, 0x4) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) sendmsg(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)=@x25={0x9, @remote={[], 0x3}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)="122fa60010c6a8451dc87a38a144dfe5c111976a3f5ff14210b824b1fcf7208393a540bf8d0676b88889a318a45b725b2e40e2c061d7ff24032861a57681348555da9b17a063be36ab400afa0b9208b165b00f9ae363a9916e036ef919ecf219776f735c4f401deb19f85012aaa5b0fd5ab25f865b8a64b2f181a527302faa65d72a46babcea9353c33f78b9ba44af7992dac37113c4175a4a6a2ef87e0b48ceb46eaf60ceeb449a95ce34f342343c22448682b9038fddaf0770d1f786ebab4371", 0xc1}, {&(0x7f0000000040)="c049e07f19733293a975c36e1c9bba460f92ff61e904c6fb7356b727dc6cd250f1a6d1c5f9ce3da9", 0x28}, {&(0x7f0000000300)="d8183fd95fee90f5f237f267313f201f5036881adc89652002b2cfcb1b7966597c9a9d2c485156d3cdc2b7d22938cffdce60dcd6fca0a28d2a5264bdd5d1c09c64636934f1035b6584c5a1ee6967e4b16cd0dcea8c82481330b0b4a60c4be558e3d35a21aef815b7d543a8c2a7ff33eb1bcdd2c436bb5af1de63978afd714ff3bb08884056307abc1aefacf78f5c7b94bed129065bfa26f9cd3a6d936062843447b9dd7fa61927d9255b14f625bd63c260b854754ec5788d51f1767d65a09dce651894782dd83e", 0xc7}, {&(0x7f0000000480)="9d4279dd8d7a8a66ba214148920bc382adf04d6bcaa34734a7fb8ac53948edf3afb2cbbc171a99497f7f13ee9cf8c2373d308bf5381792e3e18ad263edc15b85db64fe6789f9df27eb7b83d4b5f74652f2d6902b16f2c9ab146c8dc1ca3a4c502c1a366e07319447dbc78de4b0b1382d608eba51a22f4e27c5b0d2c589d231e4fba5d0", 0x83}], 0x4, &(0x7f00000006c0)=[{0xe0, 0x114, 0x0, "19b845922a6eed51c8d45b69e7c1759bc8a66b12795b3275a05bd59ebee063ecdf19ad2d653c0396ad9c0296884886f591d387614948ce5ca63345a392c49bebced6c3ffb3ea6832fa4bfcf59c130ae2960a892154f51f0ad85d8465650e01b7c5152711c7ef58b26e0afb55606f965292b746d58cf1c76ef6297318d4afed1e8e8bd43cc5417dccad45fd4527d4217d162f7a727a62b775588c0c2c6c696c106c90ac730df092d706f7422d6536af963e07cb01924158bda788562ab9cea632a3ac3e66a9a57f13b265feb623"}, {0xb8, 0x105, 0x7f, "4a54bf83bfc4ab31764d300122d71fe3119a3df45c011109c90bbafa16a178974fcbff22a43d4eba1c2c04a409171914363036459b3eaded69eecdad07f75372cb872a34033adcf44541083fc2ad88486e1d8d70e71933e9ad79890361dda624d7ef67545d194792f636f0953a4c2ac12bf9e792fc2b809c3ba79fea406cb1462bfbb09ca85ff03b7adde44303ee35c1aea12d280c0e35a3e1e2f9d5feaab2a44c"}, {0x28, 0x104, 0x5, "e222422a10192010630c68b34d5dfe43203ba3c57a80"}, {0x60, 0x1350b8a5c4b250b2, 0xea, "7de721239126d0d2cc4800e85cb50b6558e8b9aacbd64d65a3206079bf1a9617c70bf36c33ac34ac2d12f988ebee121e75e7aca77155271f1e8e0b974d0166208e3e04714e7cdbc5cbbfcdb01510"}, {0x58, 0x10f, 0x2562, "cc798f3af3d4a663200cc6479a43188027ddcd115b88230cd6c6559fb61503393bc8c28dbe1cb3456b71420d898c1cd0cca65d3a819c7e1b2b39bb6237d53f3ad627677855"}, {0xf8, 0x10f, 0x7, "191e599023050862e61fc94438e1ced10dd7923486a194e37112442896a68c573f75788e90974c5f0d8cf8ed4e510e4836d994574fa6e3f6db665372b9cdaf0917e43fc8756fb4abe4ac4edb3f764c11e8ab5336eec2701c7ee36aceb03a803d4e112b543cd3e34d302449ece5fadd10ef400e241560ae4829411d6904ab78ac51412d10c08be0e0a359513ac08169d83a05b79b571cba0f81c8ee6c579990086e4ec25af22dbbaa6edd5fe86c723ecdbe42ec176b5bd4ae0f1d168f41f49d3f2e9e8a2117901d8e750a52af738500edbeff3b90331011ac0d69529eaf0353d83f"}, {0xc8, 0x11, 0x1, "5bba8e3ea7ec8a6ed5bf90da1d3c43856ef2cf55dc4fbeb64454de9049720a7a885c65ea31376ec7543c4efd25ccb6ae27ae7cd9052b04ff0dccc9e6acee396dd8aecb1aecfec1fdae24bd4727bfe29bc8db12a91380b92f3f0e3753f5ade569f0bd4444640f01f36f5747a70f2ceb17e7163751545c9961e9720cc4ded4a5488e1fc4403c47ed02dd010b5a3e59edcec8f4b30e99f3b27184f38ea60a2763b7c47a8e8f74835821d9abf043b0c204871d7fadf876a97d16"}, {0x108, 0x103, 0x6, "8229ea2d11d8da4ede3c94ae31b5b5722629734e527053157f79e66a7c32625417ff4835a1e9238489c1223effdd857e89d8ac115a051bbcb91e629171bc3d0fea2541cd33f84be7efeeefe5dc6e78286aa34f1c0531b7ae2d112c5865df325b379bcf6b89b18bebb8fe9c10baa4bda1dc8cc8ff49c950774824c47a6b6dc32ae8b7a1c8b9c21bc1113458eefbc3faf47f98c14a3842992c40e881e3211a710815e9d07af90eeb2a1a5ca453093d2ad1d7629ef53207fcd13d66715465cce5b8240fe389e23af5cde41e09066a4bd4e55f3ab9cad7844f3d0f97532ca83edd102a8ca3f14259547acff4f97ce03166ce9273"}, {0xf0, 0x1c8, 0x0, "4b7d4094553e69e4bb287e038681932c93c56266389864b21f9c3ec0974f6f27ab0ea6582d59f52dc90327e3135cfe80475db98e8f476976bf2a3d810ccfe80a4d467d39e79bc060b4f555cd4dd8514eac45e6ad906787610566bd4a27bb9a5a7d728ad625f08319ce1a60c2514c833fa4aa5fdcc7583259dbfc84b276622a6fc09b6950ca0bd49b3fba341a4bfba6567d883326854bb90d012a075d25c4688f0d405df1388f313d62cabb64ceaecd92998fbc099a0cbc86434bce633228028c7b6191293ae888f006bfb4900c427343faa0ff4b387ac885a80d"}], 0x630}, 0x2018000) 05:20:46 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) pipe(&(0x7f0000000040)) fchdir(r0) write$UHID_CREATE2(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {0x0, 0x2be}], 0x2) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x235) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x5) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) sendto$inet(r2, &(0x7f0000000540)="9cc6ed16509e97b53a9cd1ddcdb0841dca8474a4a204bdf6487ca997df5e4cc29a072116421fe182767c830b5044ae68e8eb805e84560b533006f5a95431bfaa907ab9a42c76db2c65baf5c9357229c825dffebe698e312a286806f3750b760c67a0d018c508c5a8c21ed3fcc6c58b3d35607a5cb0a0dc1c790581366e66d526cfda2d34bd68edad4d7273f5516aeec646327b41330612b16e5399cf33155794608de8f269d982213188a0d08bd5577c10c819e8e9a8afc4019ba8ed8d68b27dd107ac905795c9f76027fcad74402ffc085cced7873ba652021a045f1735d9ccb9c218d20f6e2f3c77c7039497317551085a0c26f32fe1a2fe", 0xf9, 0x4010, &(0x7f0000000640)={0x2, 0x4e22, @empty}, 0x10) 05:20:46 executing program 4: ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) close(r0) r1 = socket$netlink(0x10, 0x3, 0xa) connect$netlink(r1, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x4f126d817891da9c}, 0xc) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r0, r2, 0x0, 0x8000fffffffe) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) [ 2301.395998] audit_printk_skb: 48 callbacks suppressed [ 2301.396011] audit: type=1400 audit(1574832046.949:4972): avc: denied { create } for pid=2349 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2301.583960] audit: type=1400 audit(1574832047.129:4973): avc: denied { create } for pid=2351 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2301.606455] audit: type=1400 audit(1574832047.159:4974): avc: denied { write } for pid=2351 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141043, 0x191) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r3, &(0x7f00000017c0), 0x351, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x351, 0x0) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r4, r5) writev(r5, &(0x7f00000023c0), 0x1000000000000252) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r6, r7) writev(r7, &(0x7f00000023c0), 0x1000000000000252) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0xcc) keyctl$describe(0x6, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) write$UHID_CREATE(r1, &(0x7f0000000480)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000180)=""/69, 0x45, 0x0, 0x4, 0x0, 0x1000, 0xffff}, 0x120) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001001800800000000ffdbdf530a0000e5", @ANYRES32=0x0, @ANYBLOB="000002000000000000001b00000000fb"], 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) [ 2302.128908] audit: type=1400 audit(1574832047.679:4975): avc: denied { create } for pid=2349 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:48 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2302.130676] audit: type=1400 audit(1574832047.679:4976): avc: denied { write } for pid=2349 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:48 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000440)={0x40, {{0xa, 0x4e20, 0x1f, @mcast2, 0x1ff}}}, 0x88) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x0) flistxattr(r3, 0x0, 0xfffffffffffffff8) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) r4 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x882) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0xfcc9}], 0x1, 0x81805) open(0x0, 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0x0) dup(r6) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$RTC_AIE_OFF(r2, 0x7002) r8 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r9 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r9, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000200)={0x0, r9, 0x0, 0x0, 0x800000000}) r10 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r11 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r11, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000200)={0x0, r11, 0x0, 0x0, 0x800000000}) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r11, &(0x7f00000000c0)={0x10000000}) ioctl$LOOP_CLR_FD(r4, 0x4c01) [ 2302.155778] audit: type=1400 audit(1574832047.709:4977): avc: denied { create } for pid=2373 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:48 executing program 4: prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = fcntl$getown(r1, 0x9) ptrace$setopts(0x4200, r3, 0x9, 0x100000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3b) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) getpgrp(r5) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3b) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0x5b, 0x4, 0x0, "39916c021f5265dc10e825de4dbfe4b0", "d0e2d1e7699fe603c92d950a41b67e2a5b80b34a1593962c72c95a770698a3d8d7d677a415250af5fde824cb399922259450fd8330627d65def1bc06d477f9a8e42d5e2c7946"}, 0x5b, 0x2) ptrace$cont(0x7, r6, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_user(r7, &(0x7f0000000080)={'system_u:object_r:default_context_t:s0', 0x20, 'unconfined_u\x00'}, 0x34) pidfd_open(r0, 0x0) [ 2302.218999] audit: type=1400 audit(1574832047.769:4978): avc: denied { ioctl } for pid=2349 comm="syz-executor.3" path="socket:[147623]" dev="sockfs" ino=147623 ioctlcmd=0x5201 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x6, 0x0, 0x0, [{}]}]}}}], 0x18}}], 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1f10c0, 0x0) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0x2640, &(0x7f00000000c0)={0x8}, 0x8) ftruncate(r0, 0x36b) [ 2302.236679] audit: type=1400 audit(1574832047.789:4979): avc: denied { create } for pid=2373 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:48 executing program 4: set_tid_address(&(0x7f00000001c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000500)=ANY=[@ANYBLOB="e6ff0300540000552331fe0500fac9067f13675ab4f21605426df77738e50ed738badbf601512384a22cb801af95d8318127863feeb4d425bb3550d9d1bef53916f48e369a7a006fca0a9e6a32387146ec582e122d7e41c292a0d7049a665de7a0e13927872cc1215b49015af7c5", @ANYBLOB="850081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c15316132e2eef5d52d89de64f84539c"], 0xac}}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000200)}], 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x3d8, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0, 0x12f}]) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0x9aef40360da4d477, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000140)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="100000007877115baca30eca7b97020046f3e01f0ebab2c0f5829695cfae09da080000000000000052b8f01cbc804e010e11473b7265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db2339889728c6956db664691ca5e0ed9b706a410c29e9c695500000000000000000000000fea5286623e35f5680c3be50af61f8821bbb687ba49a67f33d28e9732cc1184b9e5"], 0x90) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') keyctl$set_reqkey_keyring(0xe, 0x2) [ 2302.247767] audit: type=1400 audit(1574832047.799:4981): avc: denied { write } for pid=2373 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2302.269921] audit: type=1400 audit(1574832047.789:4980): avc: denied { write } for pid=2373 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2302.463642] ip6_tunnel: ‰ xmit: Local address not yet configured! [ 2303.103635] ip6_tunnel: ˆ xmit: Local address not yet configured! 05:20:49 executing program 3: ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000140)={0x0, 0x0, [0x0, 0xfffd, 0x0, 0x0, 0xa], 0xd0}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 05:20:49 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:49 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000440)={0x40, {{0xa, 0x4e20, 0x1f, @mcast2, 0x1ff}}}, 0x88) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x0) flistxattr(r3, 0x0, 0xfffffffffffffff8) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) r4 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x882) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0xfcc9}], 0x1, 0x81805) open(0x0, 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0x0) dup(r6) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$RTC_AIE_OFF(r2, 0x7002) r8 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r9 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r9, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000200)={0x0, r9, 0x0, 0x0, 0x800000000}) r10 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r11 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r11, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000200)={0x0, r11, 0x0, 0x0, 0x800000000}) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r11, &(0x7f00000000c0)={0x10000000}) ioctl$LOOP_CLR_FD(r4, 0x4c01) 05:20:49 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x40048010}, 0x4000000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) ftruncate(r0, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x737d1d1448bf163a}]) 05:20:50 executing program 4: set_tid_address(&(0x7f00000001c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000500)=ANY=[@ANYBLOB="e6ff0300540000552331fe0500fac9067f13675ab4f21605426df77738e50ed738badbf601512384a22cb801af95d8318127863feeb4d425bb3550d9d1bef53916f48e369a7a006fca0a9e6a32387146ec582e122d7e41c292a0d7049a665de7a0e13927872cc1215b49015af7c5", @ANYBLOB="850081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c15316132e2eef5d52d89de64f84539c"], 0xac}}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000200)}], 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x3d8, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0, 0x12f}]) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0x9aef40360da4d477, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000140)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="100000007877115baca30eca7b97020046f3e01f0ebab2c0f5829695cfae09da080000000000000052b8f01cbc804e010e11473b7265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db2339889728c6956db664691ca5e0ed9b706a410c29e9c695500000000000000000000000fea5286623e35f5680c3be50af61f8821bbb687ba49a67f33d28e9732cc1184b9e5"], 0x90) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') keyctl$set_reqkey_keyring(0xe, 0x2) 05:20:50 executing program 3: set_tid_address(&(0x7f00000001c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000500)=ANY=[@ANYBLOB="e6ff0300540000552331fe0500fac9067f13675ab4f21605426df77738e50ed738badbf601512384a22cb801af95d8318127863feeb4d425bb3550d9d1bef53916f48e369a7a006fca0a9e6a32387146ec582e122d7e41c292a0d7049a665de7a0e13927872cc1215b49015af7c5", @ANYBLOB="850081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c15316132e2eef5d52d89de64f84539c"], 0xac}}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000200)}], 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x3d8, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0, 0x12f}]) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0x9aef40360da4d477, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000140)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="100000007877115baca30eca7b97020046f3e01f0ebab2c0f5829695cfae09da080000000000000052b8f01cbc804e010e11473b7265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db2339889728c6956db664691ca5e0ed9b706a410c29e9c695500000000000000000000000fea5286623e35f5680c3be50af61f8821bbb687ba49a67f33d28e9732cc1184b9e5"], 0x90) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') keyctl$set_reqkey_keyring(0xe, 0x2) 05:20:51 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:20:51 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x8) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x78) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="070100009200000e0000000000000000000000000000000008000000000000000529"], 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7, 0x0, 0x0, 0x800000000}) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x800, 0x0) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$sock_linger(r10, 0x1, 0xd, &(0x7f0000000240)={0x0, 0x4}, 0x8) r11 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r11, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0xee9bd60cde207d2e, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r11, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r12 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r11, r12, &(0x7f0000000240)=0x202, 0x4000000000dc) r13 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r12, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="585f99f2d4b5e35bae23437ce5057aededef8a3fc4e35caa103c6d1f7d9f0b8d7a08d3c797d925948d782753c20885c0d5270900751fcb842ac9e8b8ada0c43e42a0e302932be1c6455b35fcc4dc7555dbcbcc2aa5a71c292acfb42be3c6bf946ea99d52b7e9f4ba29fb1bf901f7857936719c2035368761bf63f4c7554a54d94e441d4ef58b7f3d451aaa5b7a006658138b5f0d9742", @ANYRES16=r13, @ANYBLOB], 0x3}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="4936a64f", @ANYRES16=r13, @ANYBLOB="01002abd7000fddbdf25020000000c000200f20400000000000008000100000000000c00020004000000000000000c00040002000000000000000c0002000008000000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r14 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40000, 0x0) r15 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r15, &(0x7f0000000080), 0xff97) getsockopt$inet6_IPV6_IPSEC_POLICY(r15, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) r16 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r16, &(0x7f0000000080), 0xff97) getsockopt$inet6_IPV6_IPSEC_POLICY(r16, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x36e365878481ecd0}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x9c, r13, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffffffd}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x130}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x21}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r14}, {0x8, 0x1, r15}, {0x8, 0x1, r8}, {0x8, 0x1, r16}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xbe}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}]}, 0x9c}}, 0x2) sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="48021444a4e43b48c3697408580ed82278e56b0874e64be9054d5c3881a7925e9892056f4903d910a5dd", @ANYRES16=r13, @ANYBLOB="200029bd7000ffdbdf250100000008000100000000000c000500010000000000000008000100000000000c00050003000000000000000c0006000200000000000000"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 05:20:51 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x20) r1 = memfd_create(&(0x7f00000000c0)='I\x00=', 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) setsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f00000001c0)={@broadcast, @multicast2}, 0x8) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000180)={@local, @empty}, 0x8) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x181800, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x41, &(0x7f0000000140)=0x10, 0x4) write(r1, &(0x7f0000000200)="0600d1004a96cc07000000f43472ca38507da40fc3162ce397d924bac1bccfa38c2050afb5c7d56ccf5bde88b0db24ca60ba0ff00ee3ed483cd0e754c04aefa9a58463db3e69863fa99427e5cc5d2d1a42fb40361c18d39641436cb47c3749666b7381483ad64080dcb283a8da701faff33d0b82234e18e5e81e00db9c78adfc53197bd554d99da81a3ee82353de47198a45475e4cffde9509cdc6f92e4c9fb82ae128aa42cb39fa6f78ca7b32d901384ab8de076a01766deaacf7de2d6d768ee712e4418e4b", 0xd0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6, 0x0, 0x0, 0x800000000}) recvfrom$inet6(r6, &(0x7f0000000300)=""/152, 0x98, 0xf3ca6c49c0a5da6f, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)) 05:20:51 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = add_key$keyring(&(0x7f0000000000)='\x01\x00\x00\x00\x00\x00V\x0f', &(0x7f0000000080)={'\xa9\x00'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000580), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$unlink(0x9, r2, 0x0) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r3) r5 = request_key(&(0x7f0000000780)='cifs.spnego\x00\x1f\xbf\xd1\xed\xc4C\xab\x88\xa2\a\xd8G\xff\xe8\x82\xca\xdb\x91$\x94\xcdF\x82\xf1\x10\"[\x857b,8\x8a\xe9O\xb3]\x8d&\a\x99\x15\xb5\xd8Ce=\xa5\xec\x13:\x97\x1c\x16\xa0\'9\xb3\x04^)l\xb1b\x88\xb8\xfd\xf6\xd3\xa8:\xaa=+\x0e.\v\x93\xf8T\x17\v\xae\x8d/\x98\x9eI\xda\xa4\xe3\x05\x13Z\xc8\x89x\x9b\xd8I\xf4\xc6\xd7\x87XHIL\xc4\xd9\x8f\xe3\xe2Q\x99\tB\\\xb9\'\xf8\x88`(\x89\x88Z+\x1f\x98Z\x14|\xf2\x04\x9e\x84\xc9a}7L\x04\xf7\xef1J\xf8\x9b\x92\xf2\xb1\x82\xbc\x8b\xad\xa0\xf0\xb4\xe7\xa5\x91\xf4\xc3\xf7\xf1\xd4\r\xe1\x9d\xe47w\xe3^\x91\xa4\xd0\xf1{\xa1\x067\xe6\xea\x90\xea\x10@\xb5d\xbf=\xe5\xeb\x00'/222, &(0x7f00000002c0)={'syz', 0x2}, 0xfffffffffffffffd, r4) r6 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r6, 0x0, 0xfffffffffffffdc1, 0x0) add_key$keyring(&(0x7f0000000900)='\xac\x82\x1e\x88?\xf5D\x9f', &(0x7f0000000940)={'syz', 0x0}, 0x0, 0x0, r6) keyctl$negate(0xd, r5, 0xfffffffffffffffe, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000d40)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r7, 0x8, 0x70bd26}, 0x1c}}, 0x0) r8 = socket(0x9, 0xfffffffffffffffd, 0x8) sendto$inet(r8, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinu\x8c/avc/cache_threshold\x00', 0x2, 0x0) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r10, 0x4008700c, 0x1d55) getegid() setgroups(0x0, &(0x7f0000000200)) r11 = getegid() setgroups(0x1, &(0x7f0000000200)=[r11]) getgroups(0x0, &(0x7f0000000240)) fsetxattr$system_posix_acl(r10, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="fac85aeaf927877416f25673eca1fe41f2cf0256717cad1126bd929d0b65b8c0f95b1811e5592165afa4c3fdfb29f5b93ab03a7bcc477b7cbf30125a60c89de0e3ef8100f80dee9326067701000000867f24a1017234ed9979518ad51a273bd15f26edd4843ba3fc4175ab8fff7f000000000000e8843d931319d2dbaabc9664232180185db726ba7b2a6b542b748546e3c7ec16b28a6b3bb4c98217d21295a81be6207747a8fd55d92b0a2f9b303cc9"], 0x1, 0x1) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000680)) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r9, 0x80003) sendfile(r1, r9, 0x0, 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@local, @in6=@ipv4={[], [], @broadcast}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {0x8, 0x0, 0x1000000000000000}, {0x0, 0x1}, 0x0, 0x0, 0x1, 0x1}, {{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x25}}, 0x0, 0x33}, 0x0, @in=@local, 0x0, 0x0, 0x3}}, 0xe8) 05:20:51 executing program 4: set_tid_address(&(0x7f00000001c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000500)=ANY=[@ANYBLOB="e6ff0300540000552331fe0500fac9067f13675ab4f21605426df77738e50ed738badbf601512384a22cb801af95d8318127863feeb4d425bb3550d9d1bef53916f48e369a7a006fca0a9e6a32387146ec582e122d7e41c292a0d7049a665de7a0e13927872cc1215b49015af7c5", @ANYBLOB="850081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c15316132e2eef5d52d89de64f84539c"], 0xac}}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='clear_refs\x00') writev(0xffffffffffffffff, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000200)}], 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x3d8, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0, 0x12f}]) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0x9aef40360da4d477, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000140)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="100000007877115baca30eca7b97020046f3e01f0ebab2c0f5829695cfae09da080000000000000052b8f01cbc804e010e11473b7265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db2339889728c6956db664691ca5e0ed9b706a410c29e9c695500000000000000000000000fea5286623e35f5680c3be50af61f8821bbb687ba49a67f33d28e9732cc1184b9e5"], 0x90) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') keyctl$set_reqkey_keyring(0xe, 0x2) [ 2306.441212] audit_printk_skb: 63 callbacks suppressed 05:20:52 executing program 3: socket$packet(0x11, 0x2, 0x300) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, 0x0, &(0x7f0000000040)=0xfc76e4a4e14c28fd) perf_event_open(&(0x7f0000000040)={0x1, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x400, 0x2) openat$selinux_create(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x3}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) socket(0x10, 0x5, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000780), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000005c0)={0x90, 0x0, 0x2}, 0x90) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="3250ec784b659c533cabce653edc77bbf31c5b167bacf23cae8f7a36771f3de1c05fa63bc1655c38efec1999417aa3adfe76c60577c6ce8612d129fdd0c824b1d8d147d6db64a7473faff2a57fe775020b03a7bc35b16a001000009dc170e0129d18226a7b9ba5e8cb76d9015c95b02034c2c0f6889b0287a68920abc1671878b2fd348d345827cbc91b5164a7766eb0a038002134c2b5bbed2557856fcde400"/170]) preadv(r2, &(0x7f0000000740), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(r3, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(r4, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2306.441234] audit: type=1400 audit(1574832051.989:5003): avc: denied { create } for pid=2467 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:52 executing program 5: set_tid_address(&(0x7f00000001c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000380)=ANY=[@ANYBLOB="e6ff0300540000552331fe0500fac9067f13675ab4f2", @ANYBLOB="850081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1531613"], 0xa0}}, 0x24040003) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, 0x0, 0x0, 0x0) gettid() prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() r1 = syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5788b6f0bfc9d0a, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x660005d5) socket$inet6_tcp(0xa, 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x11) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'irlan0\x00', {0x2, 0x0, @multicast1}}) syz_open_procfs(0x0, 0x0) [ 2306.468690] audit: type=1400 audit(1574832052.019:5004): avc: denied { create } for pid=2469 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:52 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="465b11fc52af6ef71d37fcfc264a96c40cd4229bfbc8bf93dbdd62236a7da58e97c9cc6d22adb8812033dfac4249289b434d6d76906b7a49f755ed03e9c788b8bee39f3c66d9a95b387e32ad24c3c1233437c3ac6a93df5d37283a4c4abe38f852a329ed279ea5d9cfa61f94a02121134c2383ab19b93251e26e14c8"], 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x7) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r4 = memfd_create(&(0x7f0000000100)='\x00', 0x2) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x80a02, 0x19) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r5, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e21, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}, 0x9}, {0xa, 0x4e24, 0x3ff, @remote, 0x1}, 0x2, [0x1ff, 0x2, 0x7, 0x7, 0xb6, 0xfffffffe, 0x7f, 0x906]}, 0x5c) sendfile(r3, r3, 0x0, 0x24000000) close(r3) pipe(&(0x7f0000000000)={0xffffffffffffffff}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r6, 0x3fc56000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, 0x0) [ 2306.592308] audit: type=1400 audit(1574832052.139:5005): avc: denied { write } for pid=2469 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:52 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) ioctl$RTC_WIE_ON(r0, 0x700f) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x1d}, {0x80000006}]}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfc, 0x4000000}, 0xc) sendto$inet(r3, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) shutdown(r3, 0x400000000000001) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) prlimit64(r4, 0x0, &(0x7f0000000040)={0x10000, 0x3}, &(0x7f0000000080)) 05:20:52 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r20}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2307.635479] audit: type=1400 audit(1574832053.149:5006): avc: denied { create } for pid=2501 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2307.920644] audit: type=1400 audit(1574832053.459:5007): avc: denied { write } for pid=2501 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:53 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/policy\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x12, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00\n\x05\xb0\xc3\xffc\x1f$\xb4m\xe1\x01\xfc\xff\xff\xd82R\xaf0\'\xe6\x96\x9f\xa5\xeb]]\'HP\xf8\x9bG\xb3\xfc^\xb6\xe8\x8f\xbf\x9a\xea\x9e\x8a\xb0)N\xcb\xcc\n\xcc\x03\x9ca\x90', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x4, 0x9, 0x7c2}) r5 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x2a, &(0x7f0000fca000)={0x10000, {{0xa, 0x0, 0x0, @mcast1, 0x7}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r5, 0x29, 0x30, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000a00000000000000fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000100"/528], 0x210) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7, 0x0, 0x0, 0x800000000}) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f00000008c0)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r9, 0x0, 0x18, &(0x7f0000000180), &(0x7f0000000340)=0x4) fstat(r9, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r12, 0x0) getgroups(0x4, &(0x7f0000000500)=[0x0, 0xee01, 0x0, 0xee00]) r14 = getgid() r15 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000740)='fuseblk\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r16, @ANYBLOB=']f']) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) r18 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x2}, [{0x2, 0x4, 0xee01}, {0x2, 0x4, r10}, {0x2, 0x6, 0xee00}, {0x2, 0x1, r12}], {0x4, 0x2}, [{0x8, 0x2, r13}, {0x8, 0x8, r14}, {0x8, 0x1, r16}, {0x8, 0x2, r17}, {0x8, 0x1, r19}], {0x10, 0x1}, {0x20, 0x4}}, 0x6c, 0x5863fd3d4ad2d7af) fchown(0xffffffffffffffff, r8, r17) r20 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r21 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r21, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) dup2(r20, r21) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r23, r22) r24 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r24, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r24, 0x29, 0x30, &(0x7f0000000340)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x2000, 0x0, @loopback}}]}, 0x210) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES64=r21, @ANYRESHEX=r1, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYRES64=r1, @ANYPTR64, @ANYPTR64, @ANYRESDEC=r23, @ANYRESHEX, @ANYPTR, @ANYPTR64, @ANYRESHEX, @ANYBLOB="c96dc545bb2aab1b9cdab7a835713743009dbaadd4b590d4a543916acc77d70cc9ea2aca2b34b4dc0cdbb7e612992edd4facddbf63072adca33da56ba5e64e14e7ce"], @ANYRES64=r24, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRESOCT]]], 0x8) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) write$P9_RWRITE(r3, &(0x7f0000000180)={0xb, 0x77, 0x1, 0x7}, 0xb) [ 2308.106553] audit: type=1400 audit(1574832053.649:5008): avc: denied { create } for pid=2516 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'S\xcb#'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) r3 = dup2(r2, r1) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) pipe(&(0x7f0000000240)) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r7, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000480)=[{r7, 0x4}], 0x1, 0x0, 0x0, 0x0) dup2(r7, r6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r9 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x80002, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r10, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r11, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000480)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) dup2(r11, r10) socketpair$unix(0x1, 0x80002, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r12, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r13, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000480)=[{r13, 0x4}], 0x1, 0x0, 0x0, 0x0) dup2(r13, r12) socket$netlink(0x10, 0x3, 0x7) socketpair$unix(0x1, 0x80002, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r14, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r15, &(0x7f00000bd000), 0x80, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) dup2(r15, r14) socketpair$unix(0x1, 0x80002, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r16 = gettid() ptrace$setopts(0x4206, r16, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) r17 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r19 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r20 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r19, r21, r18) r22 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r24 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r25 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r24, r26, r23) getegid() gettid() socket(0x10, 0x2, 0x0) setreuid(0x0, 0x0) r27 = gettid() pipe(&(0x7f0000000240)={0xffffffffffffffff}) r29 = socket$inet_udp(0x2, 0x2, 0x0) close(r29) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r29, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r29, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r28, 0x0, r29, 0x0, 0x10005, 0x0) r30 = getpid() r31 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r31, 0x1, r32, &(0x7f0000000180)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r33, 0x3, r32, &(0x7f0000000000)={0x15}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r35 = dup3(r34, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r35, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r35, 0xc0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r30, r32, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r36}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a00)={r27, r28, 0x0, 0x2, &(0x7f00000009c0)=')\x00', r36}, 0x30) r37 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r37, 0x1, 0x11, &(0x7f0000caaffb), 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x80002, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000480)=[{}], 0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x80002, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r38, &(0x7f000057eff8)=@abs, 0x8) dup2(r39, 0xffffffffffffffff) socketpair$unix(0x1, 0x80002, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x8) socketpair$unix(0x1, 0x80002, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r41, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f0000000480)=[{r41, 0x4}], 0x1, 0x0, 0x0, 0x0) dup2(r41, r40) r42 = gettid() getpgid(r42) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socketpair$unix(0x1, 0x80002, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r43, 0x0, 0x0) ppoll(&(0x7f0000000480)=[{r44, 0x4}], 0x1, 0x0, 0x0, 0x0) dup2(r44, r43) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) [ 2308.137306] audit: type=1400 audit(1574832053.669:5009): avc: denied { write } for pid=2516 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:20:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$inet6(0xa, 0x1, 0x8) getrlimit(0xe, &(0x7f0000000040)) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000100)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x2c}, {0x80000006}]}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 2308.367510] audit: type=1400 audit(1574832053.919:5010): avc: denied { create } for pid=2501 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2308.465466] audit: type=1400 audit(1574832054.019:5011): avc: denied { write } for pid=2501 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2308.578154] audit: type=1400 audit(1574832054.129:5012): avc: denied { read } for pid=2516 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2313.343641] ip6_tunnel: ’ xmit: Local address not yet configured! [ 2319.158932] audit: type=1400 audit(1574832064.709:5013): avc: denied { create } for pid=2809 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2319.184767] audit: type=1400 audit(1574832064.739:5014): avc: denied { write } for pid=2809 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2319.205464] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=2811 comm=syz-executor.1 [ 2319.249054] audit: type=1400 audit(1574832064.799:5015): avc: denied { read } for pid=2809 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:05 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x8000, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a726f6f745f743a733020756e636f6e66696e65645f753a73797374656d5f723a696e736d6f0000743a73302d73303a63302e63313032332030303030303030303030303030303030303030330054ae1c45210000000000000008ed77b3a0811feb17043e1e31631cf816f23325de320c36f1e3f984ec37e5"], 0x5f) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r3, 0x2, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000}]) accept4(r0, &(0x7f0000000340)=@caif=@rfm, &(0x7f00000003c0)=0x80, 0x80000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) rt_sigpending(&(0x7f0000000140), 0x8) io_submit(r6, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x10000000000000, 0x0, 0x80000000000000, 0x1, 0x0, r5, &(0x7f0000000000), 0x377140be6b5ef4c7, 0x24c800}]) 05:21:05 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x0, 0x6, 0xfa) socketpair$unix(0x1, 0x3, 0x0, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) dup3(r2, r3, 0x0) recvfrom(r0, &(0x7f00000002c0)=""/115, 0x73, 0x10222, &(0x7f0000000340)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r6 = accept4$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x0, @multicast2}, &(0x7f0000000440)=0x10, 0x2d4c33209b6287c) r7 = socket$unix(0x1, 0x1, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) dup2(r8, r7) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x11, 0x800000003, 0x0) syz_mount_image$msdos(&(0x7f0000000240)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x101, 0x8, &(0x7f0000000980)=[{&(0x7f0000000480)="1b86ddd51d73098a1c870c74456ecb168a3d37e2a7b79014b6a63686636e990713ece7901a5f5f0af4211585c3b2a1147dbba1c453ae672d6112bb8344ec89106d3c81cf58bf2aa1ba6235936922e8", 0x4f, 0x100}, {&(0x7f0000000580)="3f5b23e111c8bfeffa6b4ed3003698ee9921f6c88794d410e2a9876872616f5e035283bc4eccb65942e90acfdb56825872c6d40dd4b8e8a08e5fddfdbd274aa0829073c752186c5ce434112a28b7388d79d7969f2bc890a1f50173d46d3b1dd92b951bc277a86836f2306c0157bf6915246479abb8e9f081100e8b18378bb533ad", 0x81, 0xb1}, {&(0x7f0000000640)="35b26cf06753a37171f4c3f0258b9456df23c9b03d931dbade1be3477a0c32962943fbb06cf1a8c8384b1c5c2ddde6ed2660135c9d187536b34e574f6d368111684d0503b53065b21fb4c6ff4faef2ecab201c2a79b2eb8289d7af06884cf3e23a4fd2e86ec3bc2983d65c8355d0f245c4a61ef68c6a6daac4d9b6d78522edff852440c2aa4c488ef51248eb59895bb0909cd21ad0964bf720721c1942f60c06c44eab8b2cb8948232f8563052ce748586516e90124ac92cd08c481f94dd03148a9f7e980facb76a686f7a470559d124507e95a5412c31ba", 0xd8, 0x8}, {&(0x7f0000000740)="d38fb359bb879a1acde7d054beaa8ba571e9ee94bc07b0689332c106fb03581efd394cffef2f5a18e92cdeed420aca8195", 0x31, 0xffffffffffff8000}, {&(0x7f0000000780), 0x0, 0xf5ad}, {&(0x7f00000007c0)="6891371f29be7bd97f7b7c990353a08ec05f50559c8298db4f0707281a48eb7e16fee0c3110204502ba76b4f8e874fbfd8a13de7ee6e7f9b864acba1b805236428ffb23a4c7c2df5d5acece4e1e195881e7f06eed2119bd27156d01be11a2880a8f17a1f094881ee106024e12ddbd1d760f27e155980e1f36c754240abfb3224c5b8617ce424be2dbfb2adcb17fc13b88dca4f0676e5", 0x96, 0x5b0}, {&(0x7f0000000880)="cdadfec039af30eb1e8257c1eb87eb1a4f07db4c7a38393700c41ff851b42d93da4d288254780aef6f98b83b0114c9198aec", 0x32, 0x401}, {&(0x7f00000008c0)="41c54517147a763da0077aef9b92b7fcfbf6734990b2ea8bb07ef75a9eeeff92bf75d336e2708c477b1ee217c324884d0618d10a95c2feadfa96d226b1cbb0e77ef1c2bdb6b225d8fb0e867219eb5e921f60a6fd1e2cf9196491137376dd03dc1ebb7eefa362491331abdf940b30dd29ef6b6843b782e2dece1d93f639276bd630df924d8731e6b8510b2f3e78b95e7c302e3db841f6dfa4c97659b6b76f21c872e73091013d131233db58cf8fe559", 0xaf, 0x5}], 0x418001, &(0x7f0000000b40)=ANY=[@ANYBLOB="6e6f646f74732c686173682c6f626a5f726f6c653d626465765d707070315b6c6f2d5d732812b70c063855017cc0656c662c6f626a5f726f6c653d49505653002c6d61736b3d4d41595f52450886f6578ed899771e4651b88840805fec9c118b7518ef8ac6e7d0fb4612758786abaed27ea855f2ca154f5768c87ea4227e66b7e2273ec502d0be988498ba4cd596e5ddd25460232b48b31d6f8575f89c67b213290fc71edeaa3ed4ce7761fed1aeca4288e6f0", @ANYRESDEC=r1, @ANYBLOB=',appraise,smackfsfloor=IPVS\x00,euid>', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc482f2948e7e31", @ANYRES32=r11, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001a000000000000000000"], 0x48}}, 0x0) bind(r6, 0x0, 0x0) vmsplice(r5, 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 05:21:05 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r2 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r2, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffa}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2e5f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10001}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x400c005}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0xc0, r2, 0x10, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x61, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8001}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xdc}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000010}, 0x40) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 05:21:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xffffffffffffffcd, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="680000002900000000000000020000000600000000000000c5f20000000000000307002e2f66696c65303600000000000000000002000000000000000000004507002e2f66696c65300000000000000200000000000000000000000000000007002e2f66696c6530"], 0x68) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x800000000}) accept4$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14, 0x400) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x9, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2d8e6e4ab31aa618}, 0x40000) 05:21:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet(0x10, 0x802, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x800, &(0x7f0000000340)="ed9b421c53a779b3c05637ff419cb364f954b3024705abb27bf0c390f6825372417fea0eba7d575ea5388f96a22107c60b8828c36880470939c5cd1cc7ccacc69ff6128bc21fbd5a51156b08a77791f6") socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$dupfd(r1, 0x0, r0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00nS>\xe5\xe0\x9bi\x83\x9e\x94\xdd\xf9!!\xe9\xb2\xab\xf4M\xf2\xc9\x80\xbcR!jRu\x9c\xb9\x1cLN\xf2\xe6x\"\xa2^\x9e\xf8lI@\xf6\x84\x0f\xb2\x0f\x18\xe6\ti\xed\xf2~\xf4e4\xb0\x7f$\xaf\x8f\xe1\xd3\xb8o\x88s3\x10NR\x1b\xe3x\x9f\xce\xe0\xf3\xc5\xbe\x1d\xae\x98\x97\xb2\xe5.\x0f\x9b\x90Q\xfc\xa0@\xc2\x8f%') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r6 = memfd_create(&(0x7f00000000c0)='I\x00=', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) write(r6, &(0x7f0000000180)="6963e6424304006da3a74e3deec6fc5bb9650b5de56946c568f95d22c77190ba406d59a5958def156c9c8a2ac4677afffffffc800000000000200000f8bf54da32", 0x41) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r8, 0x0, 0x0, 0x800000000}) ioctl$TIOCGRS485(r7, 0x542e, &(0x7f0000000240)) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f0000000140)={0x30}, 0x30) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r6, 0x0) readlinkat(r5, &(0x7f0000000040)='./file0\x00', &(0x7f00000025c0)=""/57, 0x39) [ 2320.143737] audit: type=1400 audit(1574832065.689:5016): avc: denied { create } for pid=2816 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2320.194595] audit: type=1400 audit(1574832065.749:5017): avc: denied { create } for pid=2816 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:06 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x20) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7277}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000140)=[@register_looper, @clear_death], 0x0, 0x20000000, 0x0}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB='mackfstransmute \\ vboxnet0 user_id \'\n'], 0x32) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) timer_create(0x0, &(0x7f0000000480)={0x0, 0x32, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000007c0)=0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x6, 0x3, 0x6, 0x9, 0x0, 0x1, 0x2400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0xf2d8b275e8d6173b}, 0x0, 0x0, 0x9, 0x7, 0x7, 0xffffffe3, 0x62}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000680)={0x0, r4, 0xfffffffffffffffe, 0x7, 0xfff, 0x4}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) shutdown(0xffffffffffffffff, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r2}}, {@uid_lt={'uid<', r6}}, {@smackfstransmute={'smackfstransmute'}}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x2040000) 05:21:06 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000100)={0xdca, 0x5, 0x3f}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000180)={[], 0x5, 0x7, 0x6, 0x0, 0x7, r1}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200000, 0x0) r5 = signalfd4(r2, &(0x7f00000002c0)={0x7}, 0x8, 0x80000) dup3(r4, r5, 0x80000) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000000)="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", 0xfc) [ 2320.202805] audit: type=1400 audit(1574832065.749:5018): avc: denied { write } for pid=2816 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="2400000019000103000000000000000002200002ff0000000000000008000100ac141400adf11f6d6fb4eda094ff803c360b11a66e6d70c3a7218df83a291735005e4b2e656dfab8986320bb28b9c4d7c22dae2f8d6b91f5a2d79a610c19e4df23a609ca63d7bd535f0d68bb7b3e0608f08eb5ef491d3e38f654e6f08a200427bd4d59d48fd5c34b27ca09388d020fa512ddb4658e036bcd08ce6a448ded37876c57ce09"], 0x24}}, 0x0) [ 2320.389051] audit: type=1400 audit(1574832065.939:5019): avc: denied { create } for pid=2815 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2320.391136] audit: type=1400 audit(1574832065.939:5020): avc: denied { write } for pid=2815 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:06 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2320.448600] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=123 sclass=netlink_route_socket pig=2836 comm=syz-executor.4 [ 2320.723657] audit: type=1400 audit(1574832066.269:5021): avc: denied { read } for pid=2816 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2320.840294] audit: type=1400 audit(1574832066.389:5022): avc: denied { read } for pid=2815 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00', r0}, 0x10) syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) pipe(&(0x7f0000001740)={0xffffffffffffffff}) write$UHID_CREATE2(r5, &(0x7f0000001780)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'syz1\x00', 'syo1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xeb\x00', 0x10a0, 0x8, 0x8000600, 0x100003, 0x1, 0x3, "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"}, 0x11b8) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r6, 0x0, 0x0, 0x800000000}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x4, 0x328, 0x1d0, 0x1d0, 0x1d0, 0xc0, 0xc0, 0x290, 0x290, 0x290, 0x290, 0x290, 0x4, &(0x7f0000000200), {[{{@ip={@loopback, @multicast1, 0x0, 0xff000000, 'sit0\x00', 'syzkaller1\x00', {0x1fe}, {0xff}, 0x8f, 0x0, 0x38}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x6}}, @common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x3}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth1\x00', 'team_slave_0\x00', {0xff}, {0x9b6fc1de62b4746b}, 0x84, 0x2, 0x2}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) sendto$inet(r1, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) [ 2321.209116] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2321.251856] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.2'. 05:21:07 executing program 1: creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x800000000}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6, 0x0, 0x0, 0x800000000}) r7 = openat(r5, &(0x7f0000000080)='./bus\x00', 0x8040, 0x18a) getsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000002c0), &(0x7f0000000340)=0x4) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x0, 0x27f251d5, 0x0, 0x0, r1}]) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x301000, 0x0) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x24500, 0x0) mkdirat(r8, &(0x7f0000000240)='./file0\x00', 0x10) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB="2c726f6f746d6f64653d30303030303030cb7a9627cd723030303082af303030303034303030302c757365725f69643d55991940317f4b03000000b22f3647c33c8848e24e98f33e4c0688e6ad515e9d5c4851d23997307e6daf526fa05654894be746cdaad9855e8c31c35574a0c8729d1be2d2754761181d1166cd6b67b0c696ab11", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESOCT]) read$FUSE(r9, &(0x7f0000000540), 0x1000) write$FUSE_ENTRY(r9, &(0x7f0000000140)={0x90, 0x0, 0x2, {0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}, 0x3d9) [ 2321.352375] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pig=2844 comm=syz-executor.1 05:21:07 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_script(r0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)={0x1e4, r3, 0x20, 0x70bd2d, 0x0, {}, [@TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ef4aff1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_BEARER={0xd0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'hwsim0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x27a, @empty, 0x2373}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x42d8, @local, 0x4}}}}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2000}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x82}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x4000000}, 0x2) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000480)=ANY=[], 0x0, 0xfffffffffffffffb) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) r6 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) shutdown(r1, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) sync() write$selinux_context(0xffffffffffffffff, &(0x7f00000002c0)='system_u:object_r:klogd_var_run_t:s0\x00', 0x25) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) execve(0x0, &(0x7f00000003c0)=[0x0, &(0x7f0000000a40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f0000001ac0)=[&(0x7f0000002100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001440)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001240)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', 0x0]) 05:21:07 executing program 4: bind(0xffffffffffffffff, &(0x7f0000000080)=@sco={0x1f, {0x0, 0x3, 0xff, 0x4, 0x40, 0xff}}, 0x80) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') fchdir(r1) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f00000002c0)={&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1, &(0x7f0000000340)=""/76, 0x4c}, 0x20142) recvfrom(r3, &(0x7f00000003c0)=""/109, 0x6d, 0x40, &(0x7f0000000440)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x80) r4 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r4, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6, 0x0, 0x0, 0x800000000}) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2b) sendmmsg(r4, &(0x7f0000007e00), 0x26e, 0x0) 05:21:07 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) r21 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r21, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r23 = syz_open_procfs(0x0, 0x0) lseek(r23, 0x0, 0x1) getpeername$packet(r23, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r25 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r25, 0x0, 0x1) getsockopt$inet6_mreq(r25, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r26}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r27}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:08 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, 0x0, 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="bf0000002902000200000020000000000400000000e5ffff03000000000000008107002e2f66696c65308201000000020000000000000000000000000000000007002e2f66696c65300000000000000000000000000000000000000000000807002e2f66696c65300002000000000000000000000003000000000000000107002e2f66696c65300103000000070000000000000000"], 0x95) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000000c0)={0x0, 0x8, 0x3, 0x0, 0x0, 0x1}) fcntl$setsig(r0, 0xa, 0x17) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) inotify_init() syz_read_part_table(0x0, 0x0, 0x0) 05:21:08 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') clone(0x110004000, &(0x7f0000000140)="c562dd2dbe6507c733f33fbd87c84964bb8564763944f2ff74dbbbe9eacc6efc2ece6027737d0f86db68f40378f2a9e3", &(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000380)="fa20707cae9fbb3f62343aa05a6c7bddc94cb8c42ecf2c7ba1ff1ab2f4993c1004bb01c454099119707477232b0b489cb3041ec26f951c52710cb91d54f0f2607a3732ca32dec6840cb6734e4c79a96f46847e6b759f32a4aff15350d59da7fd4a66ee3d40273558a39fabb3a4c0207e7d7f0279bdce047836db40ed3f5e34c5a77b76ef1e18ee88678bd962f32320a7817538956e97bbfffc8fced4516165fca7e7ff882a486ed177ce") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) r2 = dup3(r0, 0xffffffffffffffff, 0x1c0000) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000440)={0x1, 0x2}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) open(0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) setxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x6) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) 05:21:09 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) r21 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r21, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r23 = syz_open_procfs(0x0, 0x0) lseek(r23, 0x0, 0x1) getpeername$packet(r23, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r25 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r25, 0x0, 0x1) getsockopt$inet6_mreq(r25, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r26}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r27}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:09 executing program 3: syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) creat(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/mls\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) write$nbd(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="674466980000000000000000000000002c081c53ab539d1bb6573d82d393cc1a287beeaf878a533fdb3ec4be8667a0253019a125b509000000bc247f7470250ab73b81a7bb0e8461f701482f066ac84a55f17318ae98755a99c188fc442b2dee2bebad9778c6ddb5ee247d2fbdb358b7b303fddbf8e698214e7c2b87ed7646545a92afd62bf5952904f716f0eee3b236a113058a28ce1883d85ff1c16fd18d4ddb8f56"], 0x1) syz_open_procfs(0x0, 0x0) getpid() syz_open_procfs(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x38}}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6, 0x0, 0x0, 0x800000000}) setsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000000)=0x2, 0x4) 05:21:09 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x16f, 0x1a0}]) prctl$PR_SET_FPEMU(0xa, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x0, 0x5000, &(0x7f0000000180)='vboxnet0+\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 05:21:09 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x0, 0x800000000}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e20, 0x9, @mcast2, 0xd4f}, {0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast1}, 0x400}, 0x1, [0x8000, 0x8, 0x0, 0x5, 0x7, 0x7, 0x4, 0x5]}, 0x5c) r2 = socket$inet6(0xa, 0x2, 0x4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000040)={'security\x00', 0x2, [{}, {}]}, 0x48) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) symlinkat(&(0x7f0000000000)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00') 05:21:09 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x6) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000001300)={@rand_addr, 0x0}, &(0x7f0000001340)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000001600)={@initdev, 0x0}, &(0x7f0000001640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f80)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002080)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000021c0)={0x11, 0x0, 0x0}, &(0x7f0000002200)=0x14) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002e80)=[{{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000040)="2513b290436f79b26c447eaf7ff2b7a2e69ff2edddf39ea7579841cbd7ee0f76dc3cab83a0adbf1e7a5173dafad493efbe5aaaa50e9b4cba3c988c70d835f073d247014019a3bf72e2e200d353578eff5e15a57335e9318d082ed51c9d0c1e6c46f173946aa6029a6bc4b38ca788c56069a59c5d7885cda107a683288ff59fe59e7cb5508a43a619cdb8408df41ddc1790d91c08282e5d0da11fa909c94a0394208c82b7672b7949fa8b242b870e00e735bf8e963e6fc24fc5e1a1181d5befdbec523ac2281db938fc708b0979a763da889bafb969ec44dd33c7ef159d195247474aac06c3d29843d32d94e6e49d408ad590a51dd801100b6e16c391ac62db634bf64395fa8e761399631dd0c8f2a0083803fb4912c36380351fe04fb5998bc635985d7d4e507e758a900217c2e40bbf76696e459f5bbc12b8fc3284e694156d41da71c944df96cbe7e2de8ad953f37772229432772e894e73d1a2db6877c4e79bb7cb3790634d2e9747e0ac7ffa0157c5fb311d881ddb4fb5ae9aa5617874b5d921ad75b7561eb3ff1b1290f10c02713286e638eadd7f582c18c880f0d8e0b57ba36a3e1818b1834b6baf401414fbed266a085da2b8577b3dba1a4d1572f2f34898242a8ed4bdd7bb0547cbde6c360089e5d389dbd38ed93087be9737a0eb179745fea0ca6e46562a0215b42f04f06d34c6f352a38f8731ad1b81f6bff9d5f2290515ace8cc2e5477720c2164ebe1839380b09bae86f78f4e50017bb7043de94c582b4bb491469229228c8cee41213673bdceb99f615f4fd72f821d87cb4dd479a96c01c72730b3bf9aa764ca25f47cc764f568e8bf48fcafa7d6cd2ccb21198b25b2d8a1f1e0f692f28021cd201aab868da5a82b2e0ba4c6d912b89a8f70dd93717fd1ca473c56a02989957af468331083c7bc1003115b4c8b8bebc5e17fd4b834c7ffdba950623a2cec1bd77ed73eca21179f2849a5b9b120874c4c338041df9aff7304a553c23ff046c1d5dbd35b98e4f69cb05c76c57e3f2ed6c17d52d57d3e365dcc81ed5c927015b3b514b77bf1b44e27ce287ce875d40bdefe329910f9b77e5b7e1dd981bdd1470804c0e00ab2b89c541caa1bf435188b2a7d53c6cdd5ce43d9b868bef400da597a231bdec584fc129538f86f795a193729a6408969801fc4918b38a4327d6c1666bac75623651fc74403d7339eca832b53c6a58840730bf9f0f75fd2e160cd789ebfcdd4591d876ec49c05721616734136bb59e64f43e30bf4f9aaa49535c9f1d49ca64ee74701b61e2c8759f552d3ad6f2a8f62a90e814d0b9ba6cef83d2a16653eb958f2f64d663e2e65f7c333dc0754939c6572f69558a70375783d0092cd07474e8a463d10b78790e0f40871da96a83a4a91ac7d4559adf3cf1075e090d01fe2c3ee845b6377203b4cd919745af1068b96c9331e5bf2663f80abc753251420f3fa20bf7b02142013d598163bd71f5c7af7b328a3d6e32b28da82d7f97de46997b4534fb2a8571eac4741ee7cbf71911b0e33760b839cdc047f4f997c6fcd662e96adbe2f747267201269524efe63d65f90ba7f297bcbaf10322baa11d7a5903ea7291cc024a6a876efef2132614930a3fdb621b248d22256e2989b38a2003078dd8f5a0d129daa5558f97bc4b7e7789fe97bc891b3027d465c3b198ffa3778951e0c290d03ea36cbe3a37ea013f843315fd3e317a92608300f5b8ab6b4fed575ad48ec009c3e84d50e1a3f17134a6796b82b1db7bce182cecc369531fa70109da27da12f45016ab1052b5c016c7c96006298a7b9226353c98bae13466176c98462d5945435fb1ab0e5395de8da716053733bff597a7519c66797d8078299f5384d534b0d997393879e9f00172753a5e7e989d08ee80524a099a3d45f917226a5d28a242a5aaa6b048067c46d884ecb99c7a7a775aecff084f993262495076796409b6c37c5cfe85a2c2660c39c0122e30475feea04fd5f1035e3effb8cdc6c4b81c33b1dc4de0b1bc55cf2b46fcba67102461079d1a429e3fa8a77e8db1ea240f50ce0e859f7065479fb059cbb4dfe1e1d5e7f3507f4e1959ec5034b18b2b81005b9f06b866dc20da22572fef8eaba2e5cfd8cd00b91382e79a44f0809e7e70ee5a0721f6edb0e0927c18968df6a9aa0ff4c8b227c519d117ffd688718d1ba5059558ff51f6191b8c14fe2f04db60965ead5cb2aadddff9029233af0b5e1b8aeddb97910110206f9ba6f08b29d2ad43fc9fad0916747676397148091e7463669d66ee5340608417179b3182e5197fdbc6f06a9801dc1eaebb048bae981a841c5b98623aa8acfe3c51d10cffe43f2825f4a693e421af0f7c2dc041fdea70699d7375427a74223a9a652235fae6d1df77b7ff8cebebaa1e28a6a5fd86281d5f93d1fc07684eb39c43c4c4cd9764bb17e32fa75355bb308083880240ddd414b8ca6473a1fa3dbaf6bd084c0f765944855b5c7266b393da8c4a5a63e5d14fe286297beb60a9e6db6e69028f56907ef8187d189ae312522eb216b444051839f57ffb8ac295a8f0cb21c80b4fe9e7c7f5b021a233d6d381b2892a0144c0696ef232bb7add6d6686931b20eaa683b4d3b1d7871dafb7136f294d0d22f4fa10323aec877bc6a291693d1f86c8ef315ec0d7d4799017d27079759d2cd1f8df979a51a1c6092035adf7c3871d0250e31955be2fbb501b9e09e1fa4954a5df5175198382ad0b29676d8b6ae779661dd1b47314dee826008e30fad67c343492683f12193c3ca06a423296925a663f12fcd60b04d6ec1e5c6362454dcbebecf73716e7db347bfce67adfb2b9c63355ee1e8a9df642f911b462523a03bc0a0b474bb83410194d7790244301749c48a0199f2cce0a59964ddce2fdc429699e11b9fdd442692c27dde6a968a1d28409b674add0cd19e751d172c5e6283ed48bb45b84ab62f386b08d314a8f3a5de3635c5864afe80a95187b439a6e1f9a15f2cb2fa714435222c5d114c1adf11019df894b8b7816dbd4ec7c4488da66730e3786af77b2dbec7cda0ee907347692811941c017e472faf7f06365e2e07bc7bc99af460fee7761491d96f7ac9f2a0269d50ba65a8b47c6c77f4ca8228de1f1d120fabe16e038e68b6c4f0453ce918eed83df66255d4891e5032d0af2441ea531157abac184f09f21228480971c0f337a2dbcf9f71b460001292280da9c8eb235e403a7ebf8fb0783b66e642ed67464ae212c3132228a1387d13cf48c1fed1fad32eeadafb74a1dae3b92553521b1507d2e62ef41529f5a4c4bcf313c64a932660c0c074281e585e44bd5736d03a12eebecc7b3d1ddfff84ee332f3f4ee69b6a83dc73229b4927e3400f3dbfd81498e03187221b0261c6bdf3b60b42723ccb336ce238e63c57d96c76fbf01ed7995984b197760873fb89c1e1f1de5bc88e6ffcc926e022976d6a5a662ddd0cc697396f8973032fad3a04ef856cd4e0b0bb8670f8cd9f5c68cb6244e4345ef499bbaf178aa003c0ce7c80d501b741174dd343ebbbf8caefdbfaeea57fe2362a8ea0795c243665dd41743104a713e129a791658982ffd0e6f009ec8bd0c4289fe5607763b9c01d55c5f1dd9efa9b6eca529acf0a8d2b38470543bc640283b7f3712a24775dc55db73bacc1109bc9805b78a6f7d3c6a2599f6393dc3d639323a00ff1e6f75bbea2a81e078387ef5f037c5a7075d28e724137c15ee0935b6736736f652f60f5857566ef7befc0471edd6d9b1bab31c14d27005f28f3883ad120a1cd90650bcfd42d16f20df54f898e274f805a87a140f74fc0bfa233f5c9b505864e6e6da5318eac2b211817bce21b6784eec038999b3c6e7473e35c304c96b9efbfc2bc24688d8557ddd689b10ca87cec9a00ec938ff5977eee8d434e76ef48b45eb7fc547fd8f948370aa96eacb64064324b1c42f6189664c4b888c3dd168eab1b47b702d93d65799b6d76647f9a47507d057e897264a28c5953599362ebe1aab46b89a747848d8e1b8e620d96d332dc345b7e35ce09727606449ed438e3d2f11c6bde99af9542cb53c493eecf8ca0cd68fa144437953c6138ce80beedd6a2f0e4a1bb57e45286636062975da72baff772415f038edf5f71db9155d2796d713088b0227e17f0423d2955cdb8452de5e7ec61b6c5cc904855344b6b3a0ce1c4f7899349466ebb356d9fbf272128f9f4536dead8f181a5b1487548fb57cb1fda409886a06a20be5770d53aa04fe758d92b2b8af52907a173c2afb642ffacfcc65385f4859e2a06fe0b79774e253f554b1043cdb3c57b60fb91b6a165109c89c207fc6bbaa6b6fa47449ec8a80e2fb2f63f67a2b8b0cf7999ce44feb15a99de8ee00c2d1c082a76257008d9295a4ba4022f7ef75644a0117369880a34e2f0cdfdc17daeb8a26c34e6b4eb384845e71a0d798281f46099807b32d4404f63b2f82c852ee05dce0555eb0252156d7a5a5ca0f48bb4ab48831d9a8ba71cc69ae15f1f202197b8bdc9ec969b1d9ca1f19cfac9ead78084e821718fa5d00592314b69cef4d9d25812846e38675db8d25b990f5e1e68fe65d8b8aff2f6cb805383895e6d64b99c4ace76f60ba0c364094375a98c755b44b862b748beb799c9c3db2108faa7bc9196c5fd35b866cfa506cc8dd34b47ae0d95c5967ac7beaead6d18db45db9a7fb173e454278b1caacd5d472b040eb1c7340455e2246ebb28fbf9f4a5e8a1b60123c7213d55d177a4cdafbd0215ca29e0f9c0acfec1f414fe4c28a04a935961e67a4cd51d995aab733278e0983132300c99f0afba0399aa6d73fc265c76c528c13984ce9dfef9169f4ba5cffef948aa8aac69d033a7e14556aba9d0663c07555f145bf3cc11acb51a0a2a5d6d143c537c9fcd87c63b639ddfbc70dad56eebe556b51a347d633ce36964f462beeb3737efee178fa8c1d07136dd76c0313b0043c023554a2b3e13535963defaaf3855dfa519a0d9add668e631193783b1e7da15267dc2d052f985e80d6681090906efe60872566355468aecb13adf12ae52cbd5daf8530480cbe7677dd5ce9511cf99498458a2f48905700064a62429670644a638689e25133a9544f6c84ae14d7e14cc41f74dcec3b117802de7cd5bbac969501d6597ebb2fccd6e8c4c7267f595a49d2f9940c736182b104cd943156a5b382e9cc640a7a90248377315822cd852b52ccb79e9544737cd3e1451a53ead8dd955d7a7b593465918e91f7f06f475686b854db659fb04407a34c04eed1a2a6bd5b901344239bcacef4ed5280258f4e2e86d674b16b3b5f9961123b9c8a75aea7165174cbc1ce594c32287a358d01cd2308bf76b6cd968c5cabb701ffdbf5ace5977775dd669c643718583d30ad37d7ad2b195ab66e341e29f56ee9f98cc72d8fbc8b96185dad28dade8a5839579220c7133d340d00bb473c2b3e7d05857f47e3352e6cf2619eb95a633656de99ad3f47c9febf0cb566ed2f22f0db9a46ce94826d05ed8bc4b047b17e72633b35b2f0611185db32b2e667aba7b1bf9654dadd12f244ea27e94efc234d6ddaa216f19780c0062a01c23cc17be70326c0a27147909b650939b27aa18ae710cc40ea85478b7ba4e9854b3553b6e163647205088ceca51ff998b76955fecee67392f854b5c9be253f2e4fc3d55565dc2d24e5eceba0ba9a7ec19b4b2ae10355cc988c7a0a394fc12811df0c3c6d919ce3073be0c232790a0535e39ea147be5c69a7d6bd39622d51744e59ca529e15141f4addf4268602867afe0e4477dc508bae20256b7aa0feab6", 0x1000}, {&(0x7f0000001040)="9ca2ffe3c61b44c7b4224f3157298afc4ac7c61b16c6cb07904a5ed86c86a9d3f0537cd84c9df19b82ad09a21d", 0x2d}, {&(0x7f0000001080)="50f3baff968ec2ad73d82e2f43b43b11918e68c822054661aefadbeb10b0", 0x1e}, {&(0x7f00000010c0)="4ee13850ea8f761c461ab47cf197089a5fc3997c02d488755d1f446901c6305d625cb4397d4d57a629464bad9e615ed8c299dc58d91fc871bdc8d520e68307b023a9fa63a8af15e62d6cfaeb4060c28ec16f38c7ab4e99e0848a37a893998dff858cc97244fe27b183e7d623914060eb7fed2587020735547af86ca3c714634adbb0f899d425e82778a97446fa4f637a65493b33b3b5a8d6a950230a597da1499578b679434ca2c22ad6c8737d6395dddd8fe9c183895c402910273773ecd6c15fc586871fec6199e5ae479dc402f3c11583363a148526d6e9c1d53643f06f1762d9ffab57706e15555f9f4e83910201ef4aa89f2e5a35856e", 0xf9}, {&(0x7f00000011c0)="c88f0d9f3f770d4cb77f686e1f2eae2ce1bc6c1fbb01c809a94183f550990084a20a839d40932806669da77df1fd0a34355834025091696ddde937a0ccfaa42369e965daefa9bf0f0c354ecf82d525884b14e9816b9ec4f3c8f55ce71551ba9c69d45084c3974de3e91a6812ec85edd8c5b665a5bdf6bf367c6b12a1ba3a3769bfb9ea7899f1f9e995aa5bad0c354704", 0x90}], 0x5, &(0x7f0000001380)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x401}}, @ip_retopts={{0x24, 0x0, 0x7, {[@generic={0x44, 0x2}, @cipso={0x86, 0xb, 0x253, [{0x2, 0x5, "9ff23a"}]}, @ssrr={0x89, 0x7, 0xe, [@rand_addr=0x4]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @rand_addr=0xbd, @remote}}}, @ip_tos_u8={{0x11}}], 0x78}}, {{&(0x7f0000001400)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000001440)="f35937b2d6757dc64f2f67d880c6f8048aa18512df955957b882", 0x1a}, {&(0x7f0000001480)="9e233d28917f348bbe5186d8b6dd0734e6d6188fd4b1d1cd532905872d76fad61919dfc5f701205586941ab8f553a828bd4f27f8308b5d0fcffc3d595e7b7bf442b8cbc5566ee349aa6ee6d641f70e3862a3efaf823f12a201cacdab34716eaf475c144fb77190c63230eeef9ff514c70171303d84d4123ce806e7d5cb1e91ac11754ad3095e1c1976e1562d87ff2b8d48b2558feecf0bdb23ecb5e96f94ffa6329f1b5cc2fd18858fa93437af7c5541", 0xb0}, {&(0x7f0000001540)="7f87ef539f44a4f80ff5ed1c9531139aeeba7f9fa5f841c9eabdb8ae8b4d921368dbe405712e36bb49e960775250782efd866056020d1cc93297bd292c12af2c5e40fcf9ddad3df043b2c445b50fb0b98814fec53befbc90cba458b78b7524aa5c15f218", 0x64}], 0x3, &(0x7f0000001680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @multicast2}}}], 0x20}}, {{&(0x7f00000016c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f00000017c0)=[{&(0x7f0000001700)="65ef56526511cbb0b68c06e96c1abb6c50058344bedc0378599ac792ad17ca3a2bac99f00634633b024e70b6b70faf426f637aed5fee81c33c652347d4f865596bdf0d26bb74de368d2951bf31f88156d1855609582d9fef9c6aa1427180962c0da61e854bb7212cde891ebdbf18c23e8082", 0x72}, {&(0x7f0000001780)="0f050b7d82f9ee15211237429fe1eb9a910ed97b0eb7c9df65b5862bfd3099162dabdb3f45c165285866", 0x2a}], 0x2, &(0x7f0000001800)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3e}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xdd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x200}}], 0x78}}, {{&(0x7f0000001880)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000019c0)=[{&(0x7f00000018c0)="f5510509dba53a0e77da8e889feb47c7b1dc1701eec9ad6eb77f7a68427c280e378610ca0d1e6ee93d8cf27b75120621781b8f77f090db6545a624086f0ffc151cb9deaa79960278499a55fe3151a599e1fea052", 0x54}, {&(0x7f0000001940)="c2d4888c41897be6b08e29c822355b7c0db57516def45b77effdb5b481630f9983cb43db74e688cc3b263b392196dbc4eda1d80dd572ab9950a9e23a1bbc295d97edb8ebfa8abd902c6e", 0x4a}], 0x2, &(0x7f0000001a00)=[@ip_retopts={{0x5c, 0x0, 0x7, {[@cipso={0x86, 0x18, 0x8001, [{0x6, 0x12, "24b5fdd67914c151dad55a8c772bd0ff"}]}, @timestamp={0x44, 0x2c, 0x73, 0x1, 0x3, [{[@empty], 0x6}, {[@remote], 0x3}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x5}, {[@multicast2], 0x7b4f}, {[@empty], 0x8}]}, @lsrr={0x83, 0x7, 0x80, [@multicast2]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x78}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_retopts={{0x70, 0x0, 0x7, {[@cipso={0x86, 0xe, 0x1f, [{0x6, 0x3, "9b"}, {0xf, 0x5, "cae3bf"}]}, @timestamp={0x44, 0x34, 0x80, 0x647cb8a0bd43ab90, 0x3, [{[@dev={0xac, 0x14, 0x14, 0x22}], 0xfff}, {[@broadcast], 0x4}, {[], 0x6}, {[@multicast2], 0x2413}, {[], 0x1000}, {[], 0x6}, {[@rand_addr=0x4b65], 0x9}, {[], 0x200}]}, @lsrr={0x83, 0x17, 0x4, [@local, @empty, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x25}, @multicast1]}, @ra={0x94, 0x6, 0xdc}, @end]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_retopts={{0x170, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xef, [@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2, @rand_addr=0x80000000, @dev={0xac, 0x14, 0x14, 0x27}]}, @cipso={0x86, 0x49, 0x628501cc, [{0x0, 0xc, "c6d4da9e541872f5bcd7"}, {0x8b144c7a7b430305, 0x12, "7561d4187a6104c7d047e36644938333"}, {0x0, 0xc, "4af6435e78b6e6ff4025"}, {0x7, 0xc, "40d734fd8fccff76cefc"}, {0x5, 0x9, "3229a9732f7816"}, {0x1, 0x4, "832e"}]}, @cipso={0x86, 0x61, 0xb, [{0x5, 0x8, "69b20f50fa1d"}, {0x2, 0xd, "74e6100c8360cbe817e70a"}, {0x7, 0x11, "697776e411a0d43d04d5a753e43c46"}, {0x2, 0x12, "bb36c868fe70041b876a44b550f103c9"}, {0x2, 0xc, "da9f9372f795a3f39c1d"}, {0x6, 0x10, "e04c32091604df8cecf5009562f5"}, {0x6, 0x7, "fd6be850e0"}]}, @lsrr={0x83, 0x7, 0x6, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x65, 0x1, [{0x0, 0xa, "f61ab530ef75956a"}, {0xf34e5b47fc9c739a, 0x12, "21396354abf1a3f0acf300975c323c77"}, {0x7, 0xc, "09f945ccc41b8262f066"}, {0x7, 0x8, "3000c0264ddc"}, {0xd91136a4dd10ca26, 0x8, "a3cac64c1bc6"}, {0x0, 0x6, "192b44eb"}, {0x5, 0x11, "70b8821da6066bdec97c50eeae7512"}, {0x395793aeda2ba339, 0x10, "cda404499a305b319ec5311be9ea"}]}, @timestamp={0x44, 0x20, 0x40, 0x6fdbe3c47803dd05, 0x7, [{[@remote]}, {[@local], 0x2}, {[@local], 0x9}, {[], 0x7ff}]}, @timestamp={0x44, 0xc, 0xff, 0x0, 0x9, [{[], 0x20}, {[], 0xffffffff}]}]}}}], 0x288}}, {{&(0x7f0000001cc0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000001d00)="92b7fb1d1bcd3249b219", 0xa}, {&(0x7f0000001d40)="23c8dff668a13f8793691ed563d1a1647f5e272f930d93430c06d8a9a1d643913df5b3a97b60043c369022db6ea8de8d8294a2c4542fee1be2461b248583d853378389bbbd7c33c1809a1a4837ca04d722f7347f37a886ef8ca01f411b888ddf79291583566a9a0d30820a95f17e8063e8ba3c17a6362f23a7199ea50cb1deb9d8245c426a21ebeeaeb2b6eace7d36feae6fbb378afa921fa3319f8d5b48386193ffa6b7da27c44ed7d6e2adba535192bd387cc45ae53c2e2b3d378b862f5db806741dbcf142a1a8226fd5ebe5d51822e535c0dea75520be1c4a5c", 0xdb}, {&(0x7f0000001e40)="9ffdc09e86a593111649414ac2f743c1a40beeaad09672a1cb671603992a4f0e0aca2d322904d55535cdd704fbb2b1891cfd628d0d95475aa4082c676ffd1f2d1f7c0313d11ec537003060c4f74bb8cb82b048bee27989c7930d523a70aec863a974ef784644315419127ddfb20475657ce6f9c3acb55b695ecd5d874053851395e46235d74b2b127dff63c09b165cd0b87c550f936ab9b6bee27fe4e855b72ae1d50ed95e2cc49936c680d9551528a557c4d68464653bafedb0093015a6505188bb3e70cf", 0xc5}], 0x3, &(0x7f0000002240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x9, @loopback}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8001}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_ttl={{0x14, 0x0, 0x2, 0xb093}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @loopback}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xe0000000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_retopts={{0xa8, 0x0, 0x7, {[@lsrr={0x83, 0x1f, 0x8, [@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2, @empty, @local, @local, @multicast1]}, @cipso={0x86, 0x47, 0xffffffff, [{0x0, 0x7, "145e94df9d"}, {0x2, 0x12, "6a266163e822559e357245a91668bb9f"}, {0x7, 0xb, "2bd5564ac33afa0afd"}, {0x0, 0xa, "cb1d5741a0aed9ba"}, {0x2, 0x7, "154389646a"}, {0x2, 0xc, "3cec9f61f67108b80fcb"}]}, @lsrr={0x83, 0x17, 0x2, [@local, @broadcast, @multicast2, @multicast2, @local]}, @lsrr={0x83, 0xb, 0x8, [@loopback, @broadcast]}, @noop, @ssrr={0x89, 0xb, 0x2, [@local, @rand_addr=0x1]}, @end]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x198}}, {{&(0x7f0000002400)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000025c0)=[{&(0x7f0000002440)="8fe801239e2c5ed5f7b58f575a22c226291cb4bc072430df03d31ed7d3c9153382cc58278815cc42eb8e05d742dd8974878ecf1fe64db11f40e050ec250d2b3bcd3cdc5c32b2ca52ac1effcf5be5cbfbe6c47585db9b05cc786d31a069afa45dba8ab629", 0x64}, {&(0x7f00000024c0)="7530703d8ba53cfa39767942b6938070a3adaa199860da7d3453e6fe2d40ffb8205c3bd13339df2177f664fee052751c48ea407942553955a42dbc6e026ffba31c58a6797cd045a37b2814a829a259f0b64ffe8722076e4fa9b5548141d75ecc442fe45188baa70aa8dcaff5cf0776c432f8bea0734015e7f252f4159b8b3f3ccef58b78fe5f06398ce08abe1b1892eede07f5a21e7f0fad0d75067df25e73002e894b7427618ed4713eed15c5bdd5f2deae4ccbb8fcb1e799ab8d81f06cf5d5390f187a6e295b8453a451", 0xcb}], 0x2}}, {{&(0x7f0000002600)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000002bc0)=[{&(0x7f0000002640)="52bf5a2dc6fa850eceeca1e2d7244aa4d9966090e13cf7c744d8a9ea8a6d39abaec70bec220181c3c4b7eec1b57e571839d6493fbaedac6ae1b386c4e251ba38cb19dcea6e46df7cd531de6f3d4c563374ca686e9f94a46759452d52c8308afdf73dfd7eb48ea6d410c4cdbf207bb010d30fc8e1b87bed8616794a1d96174b97125003bcd8d8a49cbd954d17661170f3b592e1b76eec120f26df056a45a2e7ad351e775c09f98a8abdcb81b596cb0c0a6c367b31734a522f9d25d61b7c1544f517da6e1df51a71318fbde1051f152e1548b0506873d049a2", 0xd8}, {&(0x7f0000002740)="f33d22dc9f727872eeff7aac2764b9f5402ff9ebaf635fdd63", 0x19}, {&(0x7f0000002780)="64ebc3530637c694584db02c8b29c68530b2db6995999861818d6f6efe90e56abcbbcc4f0672c0256d4306f4358796cc4e21679bcf13a621f6b2d3f8eaeff62058978dcd214381d67fa14fa28c2b49f284adbe3cfa4c7021d91f18cafb2b4f96cca2e25c193c7928b2662794ba1bbd9473c33f1128398da50fd89242c9f622c0473ebf692a79aa32", 0x88}, {&(0x7f0000002840)="da3d1229b9782b537484941059022a93c1a76a83f23dfd9713816b4d109d34b44b0214a9be464806007c60aaa0c700aa3ac0474a73cddff72125e3523a0f7968da98891ac4ce00e3c9514491bd6e9771cb256cf3a19439fe", 0x58}, {&(0x7f00000028c0)="749770eda77c95975821d25c19c9c1d0ed17aba6e83da4e7bd1b20677aa0e792230f873aa39cab59acd686c4f1fcdfe6c185af71df9f0a931e69a3afc189760a9f1654df006f9c87db5a921d4aa1c0445fd6eb2a18f8d3e4d462844bd34e347aa0281262a8a832fa08708f82f21120c695ba9731e51edc4faba59b35dce5c224254874997a4690f5b15d64b844c5343d871e0249c7b775f71284d94b6c299c95733854d7e37e65cb77e584ff2d811ea8d1c36bb00398952abf94", 0xba}, {&(0x7f0000002980)="1856d64e49241b067e2fed4a00c76fdb0650cec28185679c23ea97b911178c7658c9aceaa79705fd28ee4eed1f8392adb741a193630d1e424a921376a0db484a0160698f28d0bf9b2ea3fe11905e298616749d2a674c02ce5eea81aa6747b262840f64b79a4cc91e45469e7248d9ebe93036b39f2d7bbdb6d410f6acdb74ac9a0c79f42bb69d8adffc94240450f86191c6a88c39b55e043069e36dd17dcd50363edee220ff48639c07f84e91fbc63d41137d", 0xb2}, {&(0x7f0000002a40)="8c713f0cc890826d5b52d5f849e75aed07485e7147a2d4db58769f717e5b86a7d6e30879d776606d1931074a37f463f462083efd3f0cc361a640e63c3c43b769eb27cfce6e5bebd07c12cc4fc5a07f51", 0x50}, {&(0x7f0000002ac0)="8fc3de1d43415968ad64c7f728683de502a97e8317a3aaccf443caf675e8acfc573ea82c2cd4579d9e925652fa7f2a47c71e100e355d42fcd831ecd46d1c66f97f5cbbcceecc2ebccf9570c3915263804299", 0x52}, {&(0x7f0000002b40)="8ef63c0882c2adc89c014ed0739440f1b04db2dee4ba047f9bf603de8c91113f28d10c0f1389edafa7e4974e5e2aba7adc5776ec510ab29a4e0e55046988c69889f76f1c811d24a9a20580c5003b", 0x4e}], 0x9, &(0x7f0000002c80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x18}}, {{&(0x7f0000002cc0)={0x2, 0x4e23, @rand_addr=0x9d}, 0x10, &(0x7f0000002e00)=[{&(0x7f0000002d00)="0eeb65746609314d4fb4df0a6d095ee7e76804660b778b1900167c1d71da86d753a401b2d0f28a63d2c88f97ca4e1f", 0x2f}, {&(0x7f0000002d40)="e2146f48ad798e1ab6dd6bc9cb93cf02c876", 0x12}, {&(0x7f0000002d80)="6f23ed155a5a17824bd92ede6e84b8791d3e2bd18a106bc2e38475f85bdce7cfe76f0032cae9f9beaf64724e502d057841803934058fa6d163a9ac9296f693348ac31a8002af401d20fe8eaa1b4f671b7e46", 0x52}], 0x3, &(0x7f0000002e40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x401}}], 0x30}}], 0x8, 0x6eeadf2fe99fcf99) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000003080)={@local, @multicast2, 0x0}, &(0x7f00000030c0)=0xc) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000003100)=r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003180)={0x0, r0, 0x0, 0x6, &(0x7f0000003140)='team0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r7, 0x10, &(0x7f00000031c0)={0x6}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000003200)=0x4) openat$full(0xffffffffffffff9c, &(0x7f0000003240)='/dev/full\x00', 0x800, 0x0) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000003280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r8, 0x4008700c, 0x178c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000032c0)=0x0) getpriority(0x3, r9) r10 = syz_open_dev$loop(&(0x7f0000003300)='/dev/loop#\x00', 0x8, 0x2100) r11 = fcntl$getown(r10, 0x9) openat$ptmx(0xffffffffffffff9c, &(0x7f0000003340)='/dev/ptmx\x00', 0x40000, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r8, 0x0, 0x2a, &(0x7f0000003380)={0x9, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}}}, 0x88) r12 = add_key$keyring(&(0x7f0000003440)='keyring\x00', &(0x7f0000003480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r12, 0x3) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000034c0)={'icmp\x00'}, &(0x7f0000003500)=0x1e) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r13 = syz_open_procfs(r11, &(0x7f0000003540)='net/ip6_tables_matches\x00') r14 = syz_genetlink_get_family_id$tipc2(&(0x7f00000035c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r13, &(0x7f0000003680)={&(0x7f0000003580)={0x10, 0x0, 0x0, 0x9040001}, 0xc, &(0x7f0000003640)={&(0x7f0000003600)={0x30, r14, 0x20, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) [ 2324.415239] audit_printk_skb: 60 callbacks suppressed [ 2324.415252] audit: type=1400 audit(1574832069.969:5043): avc: denied { create } for pid=2931 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2324.525830] audit: type=1400 audit(1574832070.079:5044): avc: denied { create } for pid=2928 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2324.528939] audit: type=1400 audit(1574832070.079:5045): avc: denied { write } for pid=2928 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2324.940718] audit: type=1400 audit(1574832070.489:5046): avc: denied { read } for pid=2928 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:10 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) r21 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r21, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r23 = syz_open_procfs(0x0, 0x0) lseek(r23, 0x0, 0x1) getpeername$packet(r23, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r25 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r25, 0x0, 0x1) getsockopt$inet6_mreq(r25, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r26}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r27}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2325.176762] audit: type=1400 audit(1574832070.729:5047): avc: denied { create } for pid=2931 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2325.178175] audit: type=1400 audit(1574832070.729:5048): avc: denied { write } for pid=2931 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:11 executing program 1: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[], 0x4c9) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x0) keyctl$clear(0x7, r1) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)='-securityvboxnet1\x00', r1) r3 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="97", 0x1, 0xfffffffffffffffb) keyctl$read(0xb, r3, 0x0, 0x0) r4 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000380)="9698dbb56dd68937e5d2369b6932562c029e43409ccf5a90ad2df62fe1bf8994cb96c94632d20745ecae0c794767eff894c9c8b1364d6b6572e027be622949c82c235d02561a23c30a2b42303c03809154b37a1fa4aed60379bbb8b0f2d7976a5497c08ddbaa0091592d02979206791ded742bc74dfa1a057aca0b35c72b202cd1f45e6c9c35dbe9362a659dc3314632f8c7dbcb4ffc7693bc2976a24f3a02138e49ad43efb5762927789ef13fbc", 0xae, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, 0x0, r4}, &(0x7f0000000440)=""/45, 0x2d, &(0x7f0000000680)={&(0x7f0000000480)={'nhpoly1305-avx2\x00'}}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r5, 0x7003) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r6, r5, 0x0) ioctl$UI_SET_PROPBIT(r6, 0x4004556e, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r9 = memfd_create(&(0x7f0000000100)='\x00', 0x2) pwritev(r9, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r8, 0x4c00, r9) sendfile(r8, r8, 0x0, 0x24000000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) close(r8) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x7000008, 0x110, 0xffffffffffffffff, 0x3fc56000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, 0x0, 0x0) fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, 0x0) 05:21:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x20, 0x70bd25}, 0x1c}, 0x1, 0x0, 0x0, 0x28000000}, 0x659d2369f0013242) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r4, 0xc018620c, &(0x7f0000000000)) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000000)) r5 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0xaaa16beecb8caebe) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) r6 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r6, 0xc018620c, &(0x7f0000000000)) r7 = syz_open_dev$binderN(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r7, 0x40046207, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) [ 2325.614062] audit: type=1400 audit(1574832071.159:5049): avc: denied { create } for pid=2957 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2325.645062] audit: type=1400 audit(1574832071.199:5050): avc: denied { write } for pid=2957 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2325.979341] audit: type=1400 audit(1574832071.529:5051): avc: denied { read } for pid=2957 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2326.000186] audit: type=1400 audit(1574832071.549:5052): avc: denied { create } for pid=2970 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:12 executing program 3: ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8001], 0x3d0}) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000003980)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f00000039c0)={0x6, 0x3}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in6=@mcast1, 0x0, 0x0, 0x0, 0xe2}}, 0xe8) r7 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="02120000020000000a0000b0d35ed3449e57ebb071b324c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605e78db9ecda3153565e1ccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c31419549b873cbb5ba641072907d47ecf13d432c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857dd5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac23fdc11b69a958683b70db1cc751d5e7416435508f2905a5839595c41c90d8b17a31e58f72027c54bd1"], 0x10}}, 0x0) recvmmsg(r7, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/193, 0xc1}, {&(0x7f00000003c0)=""/232, 0xe8}], 0x2}}, {{&(0x7f0000000080)=@xdp, 0x1, &(0x7f0000000340)=[{&(0x7f0000000800)=""/202, 0xca}, {&(0x7f0000000140)}], 0x2, &(0x7f0000000900)=""/236, 0xfffffffffffffef7}}, {{&(0x7f00000005c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000a00)=""/151, 0x97}, {&(0x7f0000000ac0)=""/221, 0xdd}, {&(0x7f0000000bc0)=""/106, 0x6a}, {&(0x7f0000000c40)=""/118, 0x76}], 0x4, &(0x7f0000001040)=""/4096, 0x1000}}, {{&(0x7f0000000cc0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x41a, &(0x7f0000002180)=[{&(0x7f0000000d40)=""/150, 0xffffffffffffff14}, {&(0x7f0000000e00)=""/218, 0xda}, {&(0x7f0000000f00)=""/71, 0xffffffffffffff4f}, {&(0x7f0000000f80)=""/110, 0x6e}, {&(0x7f0000002040)=""/29, 0x1d}, {&(0x7f0000002080)=""/247, 0xf7}], 0x6}}, {{&(0x7f0000002200)=@xdp, 0x80, &(0x7f0000002680)=[{&(0x7f0000002280)=""/206, 0xce}, {&(0x7f0000002380)=""/176, 0xb0}, {&(0x7f0000002440)=""/72, 0x48}, {&(0x7f00000024c0)=""/67, 0x43}, {&(0x7f0000002540)=""/120, 0x78}, {&(0x7f00000025c0)=""/137, 0x89}], 0x6, &(0x7f0000002700)=""/110, 0x6e}}, {{&(0x7f0000002780)=@x25, 0x80, &(0x7f0000004b40)=[{&(0x7f0000002800)=""/165, 0xa5}, {&(0x7f00000028c0)=""/16, 0x10}, {&(0x7f0000002900)=""/4096, 0x1000}, {&(0x7f0000003900)=""/32, 0x20}, {&(0x7f0000003940)=""/4, 0x4}, {&(0x7f0000004c80)=""/211, 0xc9}], 0x6, &(0x7f0000003b00)=""/123, 0x7b}}, {{&(0x7f0000003b80)=@x25, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003c00)=""/95, 0x5f}, {&(0x7f0000004bc0)=""/143, 0x8f}, {&(0x7f0000003d40)=""/234, 0xea}, {&(0x7f0000003e40)=""/31, 0x1f}, {&(0x7f0000003e80)=""/6, 0x6}, {&(0x7f0000003ec0)=""/93, 0x5d}, {&(0x7f0000003f40)=""/143, 0x8f}, {&(0x7f0000004000)=""/21, 0x15}, {&(0x7f0000004040)=""/91, 0x5b}], 0x9, &(0x7f0000004180)=""/138, 0x8a}}, {{&(0x7f0000004240)=@ax25={{0x3, @default}, [@netrom, @rose, @bcast, @rose, @rose, @netrom]}, 0xffffffffffffff78, &(0x7f00000044c0)=[{&(0x7f00000042c0)=""/218, 0xda}, {&(0x7f00000043c0)=""/112, 0x70}, {&(0x7f0000004440)=""/99, 0x63}], 0x3, &(0x7f0000004500)=""/238, 0xee}}, {{0x0, 0x0, &(0x7f0000004880)=[{&(0x7f0000004600)=""/165, 0xa5}, {&(0x7f00000046c0)=""/131, 0x83}, {&(0x7f0000004780)=""/163, 0xa3}, {&(0x7f0000004840)=""/60, 0x3c}], 0x4, &(0x7f00000048c0)=""/30, 0x1e}}], 0x9, 0x0, &(0x7f0000001000)={0x77359400}) splice(r1, 0x0, r3, 0x0, 0x19404, 0x0) ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) 05:21:12 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, 0x0) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:12 executing program 5: pipe(0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x80000, 0xf) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) accept4$inet(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80800) sendto$inet(r0, 0x0, 0xa6, 0x4b04a730fed0e78c, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) getresgid(&(0x7f0000000480), &(0x7f0000000500), &(0x7f0000000580)=0x0) socket$inet6(0xa, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x2, 0x4e23, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000df4d0800070086080000e5040058000000000000"], 0x18}, 0x0) socket(0x10, 0x0, 0x0) getresgid(&(0x7f0000000480), &(0x7f0000000500), &(0x7f0000000580)=0x0) setresgid(r6, r5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) pidfd_open(0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000002340)=""/4082, 0xff2) 05:21:13 executing program 4: mknod(&(0x7f00000005c0)='./bus\x00', 0x5eef439bff9b86cf, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/tcp\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x800000000}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000080)=0xe8) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000280)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) r7 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) r9 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r10 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r10, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000200)={0x0, r10, 0x0, 0x0, 0x800000000}) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r15 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r15, 0x202002) keyctl$chown(0x4, r15, r13, r14) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r19 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r19, 0x202002) r20 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x0}, &(0x7f0000000a40)="abe03561fcd1b38791f60a322f6ae52bdb5b082c948008cbd32423ef68889f23f6fdaaa9053ee7a3dc907ce90b433288aa79", 0x32, r19) keyctl$chown(0x4, r20, r17, r18) r21 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r24 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r24, 0x202002) keyctl$chown(0x4, r24, r22, r23) getresgid(&(0x7f0000000580), &(0x7f0000000700), &(0x7f0000000740)=0x0) r26 = socket$inet_udplite(0x2, 0x2, 0x88) r27 = socket$nl_route(0x10, 0x3, 0x0) r28 = getpid() sendmsg$nl_route(r27, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13, r28}, @IFLA_LINKINFO={0x14, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x3c}}, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f00000003c0)={r28, 0x0, r29}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) r31 = socket$inet_udplite(0x2, 0x2, 0x88) r32 = socket$nl_route(0x10, 0x3, 0x0) r33 = getpid() sendmsg$nl_route(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a80)=ANY=[@ANYBLOB="3c00004818b08a7d9b9c5c0000000000000000001612909933f6232be3240ee28637f4a98a08875f8b56503b7cd70086be133c39da48fe370fd1c6523c2843ba1c911569c9b0819dde976a29a8f03b6cbe5c0b1154d54498783044ddc88936c8508265093fde2442a077b41e9642fa113383399467c1b325bf28ca19c109056a0f5c3a014fa647137e04ad4f658dcf8c07751552d5b45573dc232a47b6c0dfcad548eaf510b7621942634358187c968d9bd55a7c8fb0e3512e06ec9277be19fa6eb496dd13d1e9a899f19d788093d9cc52e176bba1b43f36ce5768c06d2fdf7ce4879d351e4d2018dab4687e806312834a0c374a", @ANYRES32=0x0, @ANYBLOB="000000000000000008001300", @ANYRES32=r33, @ANYBLOB="140012000c000100697036746e6c000004000200"], 0x3c}}, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f00000003c0)={r33, 0x0, r34}, 0xc) lstat(&(0x7f0000000800)='./bus\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000008c0)=[0x0]) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000900)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0xa, r6}, {0x2, 0x2, r7}, {0x2, 0x0, r8}, {0x2, 0x0, r11}, {0x2, 0x5, r13}, {0x2, 0x0, r17}, {0x2, 0x1, r22}], {0x4, 0x6}, [{0x8, 0x4, r25}, {0x8, 0x3, r29}, {0x8, 0x1, r30}, {0x8, 0x2, r34}, {0x8, 0x0, r35}, {0x8, 0x2, r36}], {0x10, 0x4}, {0x20, 0x1}}, 0x9c, 0x1) setreuid(0x0, 0xee00) r37 = geteuid() setreuid(r37, 0x0) execve(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) 05:21:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000400)) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e117050ba2ad34748721aa622dd1ed841f059db35c128a5290e65a46167f115da13aefecd35261944c36abaf66911c4141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdfb0d234255ab36da307c70000000000000000000000000fea5286623e35f5680c3be50a245435a9a55a4146a56b346d6097cff241be45b19b8f7b0e6048b490b78c46dc2ba80467febd43827e227b4591763a6851bbc321dd7f0dc42fb63eb1f33914250ce3deacda9f"], 0xe1) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB="000eedc95336ccdcf4a4154041aafbb509"], 0x2) fallocate(r6, 0x0, 0x0, 0x8020003) lseek(r6, 0x0, 0x3) syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 05:21:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x93, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 05:21:13 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, 0x0) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:13 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000a40)=""/250, 0xffffff72) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_trie\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 05:21:14 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x20, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="ff"], 0x1) 05:21:14 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x2b4, 0x0) close(r0) 05:21:14 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x2b4, 0x0) close(r1) 05:21:14 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x360, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80, [], 0x19}, @in6=@loopback}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) [ 2329.470611] audit_printk_skb: 27 callbacks suppressed [ 2329.470621] audit: type=1400 audit(1574832075.019:5062): avc: denied { read } for pid=3040 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 05:21:15 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, 0x0) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:15 executing program 3: r0 = dup(0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6beb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000080)) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="0203000312000000000000000000000005000600000000000a000000380e000000000000000000000000ffffac1e0001000000000000000004000900a000000000000000020d6bfded2342273716fbaa28f7be830000000002000100000000000000000d0000000005000500000000000a00000000000000fe8000000000000000000000000000000000000000000000dd85c10ed21ce87ce1dac792a099f5615ab86ae6a3cff497ac2843cf7bd76b3b7b0f0df6f4e7da00154ef0fdebe86cb37d649b746d2447f6fd497b053e6acb85656b8e35ad24c5284a93d631415d3f5a0afbabc83d645b030b649c20cd3d60bd3775"], 0x90}}, 0x0) close(r2) 05:21:15 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x2b4, 0x0) close(r1) [ 2329.915188] devpts: called with bogus options [ 2330.129280] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 2330.213187] CPU: 0 PID: 3078 Comm: syz-executor.1 Not tainted 4.9.203-syzkaller #0 [ 2330.220964] ffff8801a969f968 ffffffff81b55f6b 1ffff100352d3f2f ffff8801c686af80 [ 2330.229057] ffffffff82aab3e0 0000000000000001 0000000000400000 ffff8801a969fa90 [ 2330.237139] ffffffff8150806c 0000000041b58ab3 ffffffff82e3a4b0 ffffffff81431e30 [ 2330.245406] Call Trace: [ 2330.247995] [<00000000fcda0b31>] dump_stack+0xcb/0x130 [ 2330.253362] [<00000000f4c6eae3>] warn_alloc.cold+0x76/0x93 [ 2330.259095] [<00000000db3c546a>] ? zone_watermark_ok_safe+0x260/0x260 [ 2330.265769] [<00000000a209419e>] ? avc_has_perm+0x164/0x3a0 [ 2330.271572] [<00000000f8634553>] __vmalloc_node_range+0x368/0x610 [ 2330.277898] [<00000000097cc6e3>] ? check_preemption_disabled+0x3c/0x200 [ 2330.284746] [<00000000e1050fcc>] ? task_has_security+0x130/0x270 [ 2330.290985] [<0000000006e9c3cd>] vmalloc+0x5c/0x70 [ 2330.296357] [<000000003c88ff13>] ? sel_write_load+0x119/0xf60 [ 2330.302339] [<000000003c88ff13>] sel_write_load+0x119/0xf60 [ 2330.308176] [<000000006224592a>] ? sel_read_bool+0x240/0x240 [ 2330.314075] [<00000000446e12f5>] ? perf_trace_lock+0x11e/0x540 [ 2330.320250] [<00000000d284620d>] ? trace_hardirqs_on+0x10/0x10 [ 2330.326316] [<00000000b6c4f13d>] __vfs_write+0x116/0x560 [ 2330.332477] [<000000006224592a>] ? sel_read_bool+0x240/0x240 [ 2330.338372] [<00000000944aea52>] ? __vfs_read+0x550/0x550 [ 2330.344007] [<00000000097cc6e3>] ? check_preemption_disabled+0x3c/0x200 [ 2330.351018] [<00000000097cc6e3>] ? check_preemption_disabled+0x3c/0x200 [ 2330.357902] [<00000000464e7081>] ? rcu_read_lock_sched_held+0x10b/0x130 [ 2330.365013] [<000000008dd0b67c>] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2330.371653] [<00000000f89769bf>] ? __sb_start_write+0x161/0x310 [ 2330.377930] [<00000000c26a7aac>] vfs_write+0x185/0x520 [ 2330.383305] [<000000006d4cf90f>] SyS_write+0x121/0x270 [ 2330.389138] [<000000002062ea64>] ? SyS_read+0x270/0x270 [ 2330.394600] [<0000000002cd061f>] ? do_syscall_64+0x4a/0x5c0 [ 2330.400525] [<000000002062ea64>] ? SyS_read+0x270/0x270 [ 2330.406000] [<0000000094568d22>] do_syscall_64+0x1ad/0x5c0 [ 2330.411961] [<00000000a11d80d2>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb 05:21:16 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x2b4, 0x0) close(r1) [ 2330.511130] audit: type=1400 audit(1574832076.059:5063): avc: denied { create } for pid=3072 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, 0x0) lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2331.592684] audit: type=1400 audit(1574832077.139:5065): avc: denied { create } for pid=3105 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 2331.847811] Mem-Info: [ 2331.850303] active_anon:100448 inactive_anon:93 isolated_anon:0 [ 2331.850303] active_file:31660 inactive_file:25096 isolated_file:0 [ 2331.850303] unevictable:0 dirty:130 writeback:0 unstable:0 [ 2331.850303] slab_reclaimable:5977 slab_unreclaimable:64815 [ 2331.850303] mapped:59572 shmem:102 pagetables:1369 bounce:0 [ 2331.850303] free:1357463 free_pcp:422 free_cma:0 05:21:17 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) [ 2331.865863] audit: type=1400 audit(1574832077.419:5066): avc: denied { write } for pid=3105 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2332.163758] Node 0 active_anon:403792kB inactive_anon:372kB active_file:126640kB inactive_file:100384kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238088kB dirty:520kB writeback:0kB shmem:408kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no 05:21:17 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, 0x0) lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2332.287791] DMA32 free:3019420kB min:4696kB low:7712kB high:10728kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3020096kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:676kB local_pcp:676kB free_cma:0kB [ 2332.485583] lowmem_reserve[]: 0 3505 3505 [ 2332.520964] Normal free:2407240kB min:5580kB low:9168kB high:12756kB active_anon:405652kB inactive_anon:368kB active_file:126640kB inactive_file:100388kB unevictable:0kB writepending:528kB present:4718592kB managed:3589320kB mlocked:0kB slab_reclaimable:23908kB slab_unreclaimable:258968kB kernel_stack:5216kB pagetables:5520kB bounce:0kB free_pcp:676kB local_pcp:208kB free_cma:0kB 05:21:18 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x28) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202d656d316e20212e2023127d037365766b90cb99c2e8611e86c759c3d80b933fe29bdf006f50d2c208af260611e08c4fa30c8ab69b1088ae75324dc55424551f30149a7e78dee2a08dff097c22d2a8f4f0ee2caa95a9b7a0ebf27e8d3e62fcbbe42c88d754b724ab83787f070c4e98695c8e169ba06edb5f952e90f2406d50ac9db78a966c782e1352c5df081c8ae5f3f9ab90c5fad2a6373832e1a2b81985e58be9bd68cf0d22929a725a616c6d0b2e5e28707d4be86dd04802da856694000071341d144a90a898195b68f504e446010194db5c92c76fbef0b0dbe05d9354721643a666"], 0xef) prctl$PR_SET_PTRACER(0x59616d61, r0) flock(0xffffffffffffffff, 0x8e19d3b35dceb3d) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_cache\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, &(0x7f00000002c0)={{0x0, 0x0, @identifier="d83e4bfae6e36b362899d69b2f2232c5"}}) pipe(0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{}, {0x3, 0x100}]}, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x95d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2332.708021] lowmem_reserve[]: 0 0 0 [ 2332.728099] DMA32: 5*4kB (UM) 3*8kB (M) 3*16kB (M) 2*32kB (UM) 4*64kB (UM) 4*128kB (UM) 3*256kB (UM) 2*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 735*4096kB (M) = 3019420kB [ 2332.813080] Normal: 681*4kB (UME) 286*8kB (UME) 125*16kB (UME) 204*32kB (UME) 276*64kB (UME) 187*128kB (UM) 64*256kB (UM) 26*512kB [ 2332.906144] audit: type=1400 audit(1574832078.449:5067): avc: denied { create } for pid=3126 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2332.954942] audit: type=1400 audit(1574832078.499:5068): avc: denied { write } for pid=3126 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2333.229511] (UM) [ 2333.254518] 16*1024kB (UM) 2*2048kB [ 2333.264701] audit: type=1400 audit(1574832078.819:5069): avc: denied { read } for pid=3126 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2333.393592] (ME) [ 2333.395773] 562*4096kB (M) = 2407268kB [ 2333.400149] 56835 total pagecache pages [ 2333.433727] 0 pages in swap cache [ 2333.437237] Swap cache stats: add 0, delete 0, find 0/0 05:21:19 executing program 1: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x100) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ptrace(0x10, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x3}, &(0x7f00000001c0)="a3dbed11c32c19b3fe8417ce6ae3a72540fc2cd02452f1fb87b0c10e02a5c2cb0461d5efb8efb846af3dd370bcf4c9aac3af0b2c5f3d084fd195f07d8df74a5f20d8696e10323f63cbbc1ed22d8bd15e2e25e227", 0x54, 0xfffffffffffffffe) add_key$user(0x0, 0x0, &(0x7f00000003c0)="8066c60334349d82052c0071c2892c88b161a0dffa47b044d487515eb172472803796f238bb71e7154d281d961da6f02c096cb3a71a03e73e1b9087ec49a5c95682a6362b62296c041189f94cf5e90b3b462b43b602652dfabc3af225156f3fecf154b54179630704668fa66eeb1f98213d81cd1b00942a5ff5fa22f32e3744328a2a4630371b1b56b021b6e01a2e707f802c357f91bc9fbac997c3701a73d1335bc7a971ea99a0bf8bbeca42c8dfb615b51a12577cfe52bc1bfd0225f3d1445c71735e680be1b482a746efea610da03da346197732903dcdc9ee39dc3909c63e1f6544f318901ba974caeaa4edbc98e0ea4d3df14b0a6cfdd", 0xf9, 0xfffffffffffffffd) lremovexattr(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=@random={'system.', '}(posix_acl_access-\x00'}) write$selinux_context(r1, &(0x7f0000000180)='system_u:object_r:dpkg_lock_t:s0\x00', 0x21) r3 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000300)='.!\xa9-wlan1em0securityem1vboxnet0&ppp0vboxnet0$,\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) rmdir(&(0x7f0000000080)='./file0\x00') setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000240)={0x80000000, {{0x2, 0x4e22, @rand_addr=0x1b9}}}, 0x88) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r5, 0x0, r5) sendto$inet(r4, 0x0, 0x5a, 0x1, 0x0, 0xb2) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x262) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000001, 0x0, 0x0) 05:21:19 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, 0x0) lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:19 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x2b4, 0x0) close(r1) 05:21:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) keyctl$get_security(0x11, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x10200, 0x2) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000240)=0x4) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = openat$cgroup_ro(r1, &(0x7f0000000480)='memory.events\x00F\xd8\x1d^\x0f\xc9\xe9\xaf\x12\'\xa81m4\xab\xd8\x99\xa1C\xb7(\xe0\xa5\xa7dLC\xbc9\a{j\xf0\xb6\xc1\xb96\x9d=r\xb1S\x9aRAb-v\xf5e\xe2I\x8e#g\xf7\x99\x9ai\xb6\xf9\xcf>h\xc3{\xa4#\xaf\x9b\x1f\x9dk\x1bi\x88\x1e\x13\x88\x02\xa9\xb4\xdek\x80\xb5\xe7\x96\t\x027=z\xc2\xa7\xfcM\xd63\ac\x8f\xc0D\x96\xa3O\x81@\xdb-(\xa2MD\x1a\x0415\x10\xbe\xc8&l\xc4eg\xd2#\x97\xa1\xb9N\x06hpJR\xf9', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000280)=""/216) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r7, 0xc0182101, &(0x7f0000000240)={r8, 0xa1bd, 0x23587f11}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r5, 0x80082102, &(0x7f0000000400)=r8) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x8a, 0x0, 0x2, "0344a1e670e7883a9f0bebbc03e29637", "11079061da6abbf27e44e289edb34e7cfbc53263b54027929aea8849d78d9c7f231f72c399a946bf4b1f6f20faa3776953b2ef49bb7ba0cce98485d02151335b76155b237ccc783d537cf5322bf80bfde4a2baf98f0dea8a0b66de423362001737def8533bb1decc41189d2316c6200257838c42d3"}, 0x8a, 0x2) 05:21:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0xfffffffffffffdcf, &(0x7f0000000180)={0x0, 0xfffffffffffffd29}}, 0x4) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6, 0x0, 0x0, 0x800000000}) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r8, 0x0, 0x0, 0x800000000}) r9 = open(&(0x7f0000000380)='./bus\x00', 0x141042, 0x1) r10 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r10, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000200)={0x0, r10, 0x0, 0x0, 0x800000000}) r11 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r12 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r12, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r11, 0xc028660f, &(0x7f0000000200)={0x0, r12, 0x0, 0x0, 0x800000000}) ppoll(&(0x7f0000000240)=[{r6, 0x40}, {r7, 0x32a5}, {r10, 0x220c}, {r12, 0x89}, {r3, 0x1}], 0x5, &(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f00000002c0)={0x100000000}, 0x8) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x63) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="00000000000002001800120008000100736974000c00020008000200", @ANYRES64], 0x4}}, 0x0) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x6e4d554c6cb1a1bb) r13 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r14 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r14, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r13, 0xc028660f, &(0x7f0000000200)={0x0, r14, 0x0, 0x0, 0x800000000}) write$binfmt_elf64(r14, &(0x7f0000000000)=ANY=[], 0xfffffffffffffdb5) r15 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) [ 2333.477005] Free swap = 0kB [ 2333.481214] Total swap = 0kB [ 2333.493094] 1965979 pages RAM [ 2333.498333] 0 pages HighMem/MovableOnly [ 2333.504129] 313625 pages reserved [ 2333.930038] audit: type=1400 audit(1574832079.479:5070): avc: denied { create } for pid=3147 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2334.160593] audit: type=1400 audit(1574832079.699:5071): avc: denied { write } for pid=3147 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r1 = socket(0x2, 0x800, 0xfd) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb200, 0x19) fchmodat(r5, &(0x7f0000000080)='./file0\x00', 0x40) sendfile(r1, r0, &(0x7f0000000240)=0x12c, 0x33) 05:21:20 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r0, &(0x7f0000000c00)=[{&(0x7f00000020c0)=""/102400, 0x19000}], 0x1) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) write(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x7fffffff, 0x0) poll(0x0, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0x2c0, 0x2b, 0x100, 0x70bd26, 0x25dfdbfe, {0xb}, [@nested={0x4, 0x1e}, @typed={0x20, 0x7c, @binary="c1129492e67d71414a9cd56c7cc0b4fe8d3f1db5cf03770fea3b"}, @nested={0xcc, 0x4e, [@generic="477e8e2e766fd6eafd73ce6b9eec581c97f0271e46baa001c2c4e9c12c7a09932551c44aa6665cbdf958ef539f8ddecad949af6d02aaf7ae0d18b4f8f2e7692d1aee561de86f4c3c50b681fbcdd82513b4e42649254b378f3625ff69bc2f997b1b420967e47f8e5ba83a20f20c471bda7833ef84c4679ae52e4fa04d826e352ba6b1173efe9ff813abf6d5293f72e479e5e7f972b9b1d2a58860cc593fbdb8", @typed={0xc, 0x5b, @str=')mbdev@\x00'}, @generic="0cb3af5ec36bdf316e13bb91f4fe67ece43fecb79c57c94db8b8b0b82d"]}, @generic="6fe4717eb2aba60d617063cf5f716cac86df67b9e3ab3d8bc2b866856f9d0f8c06f429f1f5263038ae0c8f84108b32ee0e5f7f2e195e23974a7d6537309920b84363ad980675890a037a6e1d10d3621d51e7a8a578d572ed514af18d20a495bb760e63fa3ac5f1d6677a25e1", @generic="882ba0820e05396e997134f795dfddf3fb11feb31a33e2b794c3c53d340f23a9fce2b48033902c15cfce87e1fd15521e85b5f4d872a89bbe544f5ba841bf5d958cb5bba77184cbf51e894271e377c35656586580342321c7b54ef7328fdc2f0c5cb7cdefe7635f379722ea", @generic="51cd4566ec85f2d1abc6158585f7af36bcfa24459f2e9af108460ada9b74bb296eafa4c5a985c48cdfbb78b68cb977aaf219d9bd068a2c6ca54d078edf482379f0c1923dd51566226725f35088dca5f98e816cb8b9fda1dc31c468949391cd712a7c227b982555353f25c7f4330b96d413a8ef019f4d2ed5be6694f239ebc3e32a9475b1e3cd2616ba1f0ec3bec7b1421e32d5d82cdd667249b02c7f4317f14831895a577040c98c9367e509471ef409ad4892e8691b4b0a5a01fe4e64c700f9f9e5d577eb47a5845476bb352b45db5505a5be1294beb2bb5808c0fe4609b55a73558774"]}, 0x2c0}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x5) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6, 0x0, 0x0, 0x800000000}) accept4$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000140)=0x1c, 0x80800) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) 05:21:20 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:20 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, 0x0) lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2335.307410] audit: type=1400 audit(1574832080.859:5072): avc: denied { create } for pid=3179 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:21 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) [ 2335.571928] audit: type=1400 audit(1574832081.119:5073): avc: denied { write } for pid=3179 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:21 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2335.960663] audit: type=1400 audit(1574832081.509:5074): avc: denied { create } for pid=3187 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:21 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x4000, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, 0xffffffffffffffff, 0x0) chdir(0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)) eventfd(0x0) clock_gettime(0x0, &(0x7f0000000240)) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$unix(0x1, 0x7, 0x0) socket$packet(0x11, 0x2, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 05:21:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x10) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x1a02, 0x2}) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x800000000}) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x1000, &(0x7f0000000140)=ANY=[]) read$FUSE(r0, &(0x7f0000001680), 0xfffffffffffffe2b) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 05:21:21 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) [ 2336.186603] audit: type=1400 audit(1574832081.739:5075): avc: denied { write } for pid=3187 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:22 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x12a) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) fcntl$addseals(r2, 0x409, 0x1) mount(&(0x7f0000000100)=@filename='./bus\x00', &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x2800000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="2e2f66696cc4e318c9cb653100"], &(0x7f00000001c0)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r4 = getpid() listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/231, 0xe7) rt_tgsigqueueinfo(0x0, r4, 0x16, &(0x7f0000000680)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) pipe2(0x0, 0x0) [ 2336.590940] audit: type=1400 audit(1574832082.139:5076): avc: denied { read } for pid=3187 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:22 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) [ 2336.640737] audit: type=1400 audit(1574832082.189:5077): avc: denied { create } for pid=3207 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000780)={'syz1\x00', {}, 0x52, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x45c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/166, 0x2e6}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x1000000000000012}, &(0x7f00000002c0)) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x0, 0x800000000}) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000180)={0x3d4, 0x99, 0x537e, 0x32adc000, 0x2, 0x1}) r5 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ptrace$cont(0x1d, r5, 0x1, 0x89) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r1, r0) tkill(r5, 0x15) [ 2336.673343] audit: type=1400 audit(1574832082.219:5078): avc: denied { write } for pid=3207 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:22 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2336.806845] audit: type=1400 audit(1574832082.359:5079): avc: denied { map_create } for pid=3215 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:21:23 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x2b4, 0x0) close(0xffffffffffffffff) 05:21:23 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup2(r3, r1) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000180)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x7f, 0x2}, 0x7) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x50}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0x200000000000ff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x24000) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_setup(0x8, &(0x7f00000004c0)=0x0) io_submit(r5, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000002c0)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000da80404000100000017ebe8e201000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2337.121074] audit: type=1400 audit(1574832082.669:5080): avc: denied { read } for pid=3207 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x00', &(0x7f00000003c0)='./file0/../file0/file0\x00') r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x2) lsetxattr$system_posix_acl(&(0x7f0000000680)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="020000000100000000000000040000006e2d000010000000200000002000000000000000"], 0x24, 0x0) umount2(&(0x7f0000000080)='./file0/../file0/file0\x00', 0x0) 05:21:23 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x3f) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x41, 0x1) getdents(r0, &(0x7f00000001c0)=""/166, 0xa6) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x800000000}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000300)=@mangle={'mangle\x00', 0x1f, 0x6, 0x518, 0x268, 0xc0, 0xc0, 0x350, 0xc0, 0x480, 0x480, 0x480, 0x480, 0x480, 0x6, &(0x7f0000000280), {[{{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x3, 0xf9}}}, {{@ip={@multicast1, @broadcast, 0x80ffff80, 0xffffffff, 'lo\x00', 'tunl0\x00', {0xff}, {}, 0x4, 0x5, 0x2c}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x18}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x30, 0x3f, 0x3}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x18}, 0xff000000, 0xff, 'lapb0\x00', 'bcsh0\x00', {}, {0x80}, 0x0, 0x0, 0x4}, 0x0, 0x98, 0xc0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@empty, @loopback, 0x0, 0xffffff00, 'gre0\x00', 'netpci0\x00', {0x7f}, {0xff}, 0x19, 0x1, 0x20}, 0x0, 0x100, 0x130, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x2, [0xfff, 0x2, 0x2, 0x7f, 0xfffffff9, 0xf5d1], 0x4, 0xf4}}}, @inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x2bca, @local, 0x4e23}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x578) creat(&(0x7f0000000180)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2337.769003] input: syz1 as /devices/virtual/input/input62 05:21:23 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x2b4, 0x0) close(0xffffffffffffffff) [ 2338.200257] audit: type=1400 audit(1574832083.749:5081): avc: denied { map_create } for pid=3250 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2338.648257] input: syz1 as /devices/virtual/input/input63 05:21:24 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x2b4, 0x0) close(0xffffffffffffffff) 05:21:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0xfeb6}, {&(0x7f0000000000)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff4", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:21:24 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000140)={0x3f, 0x1f, 0xfffffffd}, 0xc) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) delete_module(&(0x7f00000000c0)='ppp0md5sum&{\x00', 0x800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 05:21:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000003c0)='./file0\x00', 0x40c2, 0x0) ioctl$VT_RELDISP(r0, 0x5605) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x800000000}) ioctl$TCSBRKP(r2, 0x5425, 0xfe) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 05:21:24 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = dup(r1) setsockopt$inet_int(r3, 0x0, 0xf, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) fcntl$setstatus(r1, 0x4, 0x80000000002c00) r4 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x80, 0x10) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e21, @empty}, {0x2, 0x4e22, @local}, {0x2, 0x4e21, @loopback}, 0x8, 0x0, 0x0, 0x0, 0x1f, &(0x7f0000000040)='veth0_to_bond\x00', 0xff, 0x80, 0x7}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r6 = dup2(r5, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 05:21:25 executing program 4: getpgid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x2b4, 0x0) close(r0) 05:21:25 executing program 5: socket$inet6(0xa, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f038b0504000800080016000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 05:21:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x8004, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) 05:21:25 executing program 4: getpgid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x2b4, 0x0) close(r0) [ 2340.386670] audit_printk_skb: 15 callbacks suppressed [ 2340.386680] audit: type=1400 audit(1574832085.939:5087): avc: denied { read } for pid=3295 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001bc0), 0x40000000000016b, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000380)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x4000, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000300)) getdents(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r1, &(0x7f0000000080), 0xff97) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) lremovexattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)=@known='trusted.overlay.metacopy\x00') 05:21:26 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:26 executing program 2: socket$packet(0x11, 0x2, 0x300) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, 0x0, &(0x7f0000000040)=0xfc76e4a4e14c28fd) perf_event_open(&(0x7f0000000040)={0x1, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x200000, 0x8f) openat$selinux_create(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x3}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff, 0x2, 0x8000, 0x40ebe99894bc3e72, 0x5}}) fcntl$lock(0xffffffffffffffff, 0x25, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) socket(0x10, 0x5, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x20000012) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000780), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x4, 0x0, 0xfffffbff, 0x2}}, 0x50) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000005c0)={0x90, 0x0, 0x2}, 0x90) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="3250ec784b659c533cabce653edc77bbf31c5b167bacf23cae8f7a36771f3de1c05fa63bc1655c38efec1999417aa3adfef6c60577c6ce8612d129fdd0c824b1d8d147d6db64a7473faff2a57fe775020b03a7bc35b16a001000009dc170e0129d182e6a7b9ba5e8cb76d9015c95b02034c2c0f6889b0287a68920abc1671878b2fd348d345827cbc91b5164a7766eb0a038002134c2b5bbed2557856fcde40000000000000004000000c304226e650d2a25088014ddb65e7f0f880bf6e4d02f21084fa5349c46d6fef66963"]) preadv(r2, &(0x7f0000000740), 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(r3, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(r4, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) ftruncate(r1, 0x80003) [ 2340.744447] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2341.242895] audit: type=1400 audit(1574832086.789:5088): avc: denied { create } for pid=3334 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2341.426632] audit: type=1400 audit(1574832086.979:5089): avc: denied { write } for pid=3334 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2341.487447] audit: type=1400 audit(1574832087.039:5090): avc: denied { create } for pid=3337 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2341.541727] audit: type=1400 audit(1574832087.069:5091): avc: denied { write } for pid=3337 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2341.863388] audit: type=1400 audit(1574832087.389:5092): avc: denied { read } for pid=3337 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2341.977563] audit: type=1400 audit(1574832087.529:5093): avc: denied { create } for pid=3337 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2342.090269] audit: type=1400 audit(1574832087.639:5094): avc: denied { write } for pid=3337 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0xfeb6}, {&(0x7f0000000000)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff4", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:21:28 executing program 5: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\xc0\x00', 0x1}) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000ec0)=""/202, 0x200011b9}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x12) dup2(r0, 0xffffffffffffffff) r3 = gettid() r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000425bd7000ffdbdf2507001b000c00020008000100ff00bd0aae47f094aee8bb54c32c20929fb200001c000900080002000200000008000200050000000800010002000000e51626b3c3974e6ae4ab227b33702bbf498fb5f25e449177fdf1ccc7b2b98ef87020b4a5412a4605f970bd4e"], 0x3c}, 0x1, 0x0, 0x0, 0xc040}, 0x400c000) tkill(r3, 0x1000000000013) 05:21:28 executing program 4: getpgid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x2b4, 0x0) close(r0) 05:21:28 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:28 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2342.708156] audit: type=1400 audit(1574832088.259:5095): avc: denied { create } for pid=3358 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 05:21:28 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x2b4, 0x0) close(r0) [ 2342.779015] audit: type=1400 audit(1574832088.329:5096): avc: denied { create } for pid=3358 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:21:28 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x25186fc3c46f0929, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r6 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r6, 0x0, 0x0) sendfile(r6, r6, &(0x7f0000000200), 0xa198) r7 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r8 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r10 = socket(0x0, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r9, @ANYRES16=r7, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r9, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00'], 0x1b}}, 0x4048060) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r17}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r22 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r22, 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r24 = syz_open_procfs(0x0, 0x0) lseek(r24, 0x0, 0x1) getpeername$packet(r24, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) r26 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r26, 0x0, 0x1) getsockopt$inet6_mreq(r26, 0x29, 0x15, &(0x7f0000000980)={@local, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000a40)={0x3bc, r7, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r20}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20000000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x41cc}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfff, 0x1, 0xe0, 0x7fff}, {0xfe01, 0x6, 0x5, 0x5}, {0x3ff, 0x47, 0x2, 0x81}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6, 0x0, 0x3f, 0x81}, {0x8, 0x5, 0x5, 0x7}, {0x2, 0x1, 0xa2, 0x4}, {0x800, 0x3, 0x80, 0x1}, {0x0, 0x0, 0x6, 0x2}, {0xd0, 0x3, 0xff}, {0xdf5, 0x8, 0x0, 0xd03}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r27}, {0xe8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffff9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x880}, 0x8008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100800800}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0x14c, r7, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r28}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4}, 0xaa19d5def125c451) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 05:21:29 executing program 5: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) close(r2) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000016003f0400000000000000040a"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket(0x10, 0x80002, 0x0) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) 05:21:29 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x2b4, 0x0) close(r0) [ 2345.083936] ================================================================== [ 2345.091470] BUG: KASAN: use-after-free in xfrm6_tunnel_destroy+0x4f6/0x570 [ 2345.098492] Read of size 8 at addr ffff8801d109c2b8 by task kworker/0:0/3 [ 2345.105413] [ 2345.107051] CPU: 0 PID: 3 Comm: kworker/0:0 Not tainted 4.9.203-syzkaller #0 [ 2345.114815] Workqueue: events xfrm_state_gc_task [ 2345.119965] ffff8801da667a60 ffffffff81b55f6b 0000000000000000 ffffea0007442600 [ 2345.128055] ffff8801d109c2b8 0000000000000008 ffffffff8277d966 ffff8801da667a98 [ 2345.136174] ffffffff8150c461 0000000000000000 ffff8801d109c2b8 ffff8801d109c2b8 [ 2345.144251] Call Trace: [ 2345.147041] [<00000000fcda0b31>] dump_stack+0xcb/0x130 [ 2345.152878] [<00000000ca5c87c7>] ? xfrm6_tunnel_destroy+0x4f6/0x570 [ 2345.159395] [<00000000539feba8>] print_address_description+0x6f/0x23a [ 2345.166184] [<00000000ca5c87c7>] ? xfrm6_tunnel_destroy+0x4f6/0x570 [ 2345.172717] [<0000000014d0a3ee>] kasan_report.cold+0x8c/0x2ba [ 2345.178701] [<0000000027068b0b>] __asan_report_load8_noabort+0x14/0x20 [ 2345.185470] [<00000000ca5c87c7>] xfrm6_tunnel_destroy+0x4f6/0x570 [ 2345.191955] [<0000000093492383>] ? xfrm6_tunnel_destroy+0x34/0x570 [ 2345.198370] [<000000004774b10d>] ? kfree+0x1b8/0x310 [ 2345.203573] [<00000000dd7c2a38>] xfrm_state_gc_task+0x3b9/0x520 [ 2345.209730] [<00000000c698cb61>] ? xfrm_state_unregister_afinfo+0x170/0x170 [ 2345.216950] [<00000000c4123c68>] process_one_work+0x88b/0x1600 [ 2345.223020] [<0000000026599340>] ? process_one_work+0x7ce/0x1600 [ 2345.229264] [<00000000aabbedb1>] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 2345.235768] [<000000005df2d67b>] ? _raw_spin_unlock_irq+0x28/0x60 [ 2345.242095] [<00000000aa379868>] worker_thread+0x5df/0x11d0 [ 2345.249311] [<00000000486c770b>] ? process_one_work+0x1600/0x1600 [ 2345.255780] [<0000000058d341e1>] kthread+0x278/0x310 [ 2345.262186] [<0000000045dd4ae8>] ? kthread_park+0xa0/0xa0 [ 2345.267826] [<000000009bc09823>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2345.274754] [<000000008f8a9117>] ? _raw_spin_unlock_irq+0x39/0x60 [ 2345.281545] [<00000000124d746c>] ? finish_task_switch+0x1e5/0x660 [ 2345.288269] [<000000002ba460da>] ? finish_task_switch+0x1b7/0x660 [ 2345.294596] [<0000000076909910>] ? __switch_to_asm+0x41/0x70 [ 2345.300489] [<00000000d7d343dd>] ? __switch_to_asm+0x35/0x70 [ 2345.306379] [<0000000076909910>] ? __switch_to_asm+0x41/0x70 [ 2345.312505] [<0000000045dd4ae8>] ? kthread_park+0xa0/0xa0 [ 2345.318140] [<0000000045dd4ae8>] ? kthread_park+0xa0/0xa0 [ 2345.323769] [<00000000b9f30774>] ret_from_fork+0x5c/0x70 [ 2345.329304] [ 2345.331012] Allocated by task 26962: [ 2345.334741] save_stack_trace+0x16/0x20 [ 2345.338799] kasan_kmalloc.part.0+0x62/0xf0 [ 2345.343120] kasan_kmalloc+0xb7/0xd0 [ 2345.346830] __kmalloc+0x133/0x320 [ 2345.350368] ops_init+0xf1/0x3a0 [ 2345.353732] setup_net+0x1c8/0x500 [ 2345.357269] copy_net_ns+0x191/0x340 [ 2345.360977] create_new_namespaces+0x37c/0x7a0 [ 2345.365595] unshare_nsproxy_namespaces+0xab/0x1e0 [ 2345.370625] SyS_unshare+0x305/0x6f0 [ 2345.374356] do_syscall_64+0x1ad/0x5c0 [ 2345.378252] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 2345.383346] [ 2345.384963] Freed by task 8035: [ 2345.388245] save_stack_trace+0x16/0x20 [ 2345.392221] kasan_slab_free+0xb0/0x190 [ 2345.396198] kfree+0xfc/0x310 [ 2345.399304] ops_free_list.part.0+0x1ff/0x330 [ 2345.403797] cleanup_net+0x474/0x8a0 [ 2345.407678] process_one_work+0x88b/0x1600 [ 2345.411993] worker_thread+0x5df/0x11d0 [ 2345.416153] kthread+0x278/0x310 [ 2345.419611] ret_from_fork+0x5c/0x70 [ 2345.423660] [ 2345.425283] The buggy address belongs to the object at ffff8801d109c200 [ 2345.425283] which belongs to the cache kmalloc-8192 of size 8192 [ 2345.438202] The buggy address is located 184 bytes inside of [ 2345.438202] 8192-byte region [ffff8801d109c200, ffff8801d109e200) [ 2345.450162] The buggy address belongs to the page: [ 2345.455102] page:ffffea0007442600 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 2345.465362] flags: 0x4000000000010200(slab|head) [ 2345.470223] page dumped because: kasan: bad access detected [ 2345.476186] [ 2345.477809] Memory state around the buggy address: [ 2345.482736] ffff8801d109c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2345.490097] ffff8801d109c200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2345.497456] >ffff8801d109c280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2345.504811] ^ [ 2345.509998] ffff8801d109c300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2345.517360] ffff8801d109c380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2345.524723] ================================================================== [ 2345.532081] Disabling lock debugging due to kernel taint [ 2345.537681] Kernel panic - not syncing: panic_on_warn set ... [ 2345.537681] [ 2345.545090] CPU: 0 PID: 3 Comm: kworker/0:0 Tainted: G B 4.9.203-syzkaller #0 [ 2345.553526] Workqueue: events xfrm_state_gc_task [ 2345.558416] ffff8801da6679a0 ffffffff81b55f6b ffff8801da667a00 ffffffff82e3f7d8 [ 2345.566506] 00000000ffffffff 0000000000000000 ffffffff8277d966 ffff8801da667a80 [ 2345.574815] ffffffff813ff061 0000000041b58ab3 ffffffff82e31763 ffffffff813fee81 [ 2345.582919] Call Trace: [ 2345.585519] [<00000000fcda0b31>] dump_stack+0xcb/0x130 [ 2345.590997] [<00000000ca5c87c7>] ? xfrm6_tunnel_destroy+0x4f6/0x570 [ 2345.597524] [<00000000780ae032>] panic+0x1e0/0x3c4 [ 2345.602550] [<0000000090899d8a>] ? add_taint.cold+0x16/0x16 [ 2345.608358] [<00000000ca5c87c7>] ? xfrm6_tunnel_destroy+0x4f6/0x570 [ 2345.614867] [<00000000b4ea85c8>] kasan_end_report+0x47/0x4f [ 2345.620671] [<0000000060b1274c>] kasan_report.cold+0xa9/0x2ba [ 2345.626744] [<0000000027068b0b>] __asan_report_load8_noabort+0x14/0x20 [ 2345.633522] [<00000000ca5c87c7>] xfrm6_tunnel_destroy+0x4f6/0x570 [ 2345.639846] [<0000000093492383>] ? xfrm6_tunnel_destroy+0x34/0x570 [ 2345.646261] [<000000004774b10d>] ? kfree+0x1b8/0x310 [ 2345.651458] [<00000000dd7c2a38>] xfrm_state_gc_task+0x3b9/0x520 [ 2345.657615] [<00000000c698cb61>] ? xfrm_state_unregister_afinfo+0x170/0x170 [ 2345.664850] [<00000000c4123c68>] process_one_work+0x88b/0x1600 [ 2345.671049] [<0000000026599340>] ? process_one_work+0x7ce/0x1600 [ 2345.677290] [<00000000aabbedb1>] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 2345.683791] [<000000005df2d67b>] ? _raw_spin_unlock_irq+0x28/0x60 [ 2345.690121] [<00000000aa379868>] worker_thread+0x5df/0x11d0 [ 2345.695922] [<00000000486c770b>] ? process_one_work+0x1600/0x1600 [ 2345.702262] [<0000000058d341e1>] kthread+0x278/0x310 [ 2345.707457] [<0000000045dd4ae8>] ? kthread_park+0xa0/0xa0 [ 2345.713088] [<000000009bc09823>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2345.719849] [<000000008f8a9117>] ? _raw_spin_unlock_irq+0x39/0x60 [ 2345.726171] [<00000000124d746c>] ? finish_task_switch+0x1e5/0x660 [ 2345.732494] [<000000002ba460da>] ? finish_task_switch+0x1b7/0x660 [ 2345.738816] [<0000000076909910>] ? __switch_to_asm+0x41/0x70 [ 2345.744717] [<00000000d7d343dd>] ? __switch_to_asm+0x35/0x70 [ 2345.750611] [<0000000076909910>] ? __switch_to_asm+0x41/0x70 [ 2345.756509] [<0000000045dd4ae8>] ? kthread_park+0xa0/0xa0 [ 2345.762141] [<0000000045dd4ae8>] ? kthread_park+0xa0/0xa0 [ 2345.767774] [<00000000b9f30774>] ret_from_fork+0x5c/0x70 [ 2345.774009] Kernel Offset: disabled [ 2345.777628] Rebooting in 86400 seconds..